Quote:
	
	
		
			
				
					Originally Posted by  AdultKing
					 
				 
				One word, steganography. 
			
		 | 
	
	
 Ha! Gotcha, and thanks for that  ;)

 Potentially a LOT of work.
So we have this ^ and weeding out by IP by combing through logs, in addition to member management software & possibly not letting users choose their own login credentials. 
I know there has to be more yeah? 
Proactive:
Member management software
Users don't choose logins credentials
and AdultKing's mention 
Reactive:
Comb through logs