Formal various "hack" before, hackers will take all means to detect (you can also say "reconnaissance") each other's host information in order to determine what the most effective way to use their own purposes. To see how hackers learn the most basic network information - each other's IP address; and users how to prevent leakage of your own IP
First, access to IP
"IP" Net users as an important marker, a hacker first need to know. Method of obtaining more, hackers will be the situation for different networks to different methods, such as: use the Ping command in the LAN, Ping each other in the name of the network acquired IP; the Internet using IP version of the QQ displayed directly. The most "cow", is the most effective way is to intercept and analyze each other's network data packets. Using Windows 2003's Network Monitor to capture network data packets, may be more difficult for ordinary users to understand the hex code of 16, while the knowledge for understanding the network hackers, they can find and directly through the software analysis intercepted IP packet header information, then that information about a specific IP.
Second, hide IP
Although the method of multiple IP surveillance, but users can hide IP's method is also diverse. Take the deal with the most efficient "packet analysis" is concerned, it can be installed to automatically remove the sending IP packet header information of the "Norton Internet Security 2003". But using the "Norton Internet Security" some shortcomings, such as: it serious drain on resources and reduce computer performance; in some forums, or visit the Web site will be affected; not suitable for Internet cafe users and so on.
Now individual users hide IP using the most popular method is to use the proxy should be, because using a proxy server, "redirect service" will send out packets been changed, resulting in "packet analysis" methods fail. Some easy to leak user IP network software (QQ, MSN, IE, etc.) support the use of proxy connect Internet, in particular, QQ use "ezProxy" connection such as proxy software, IP version of QQ can not show the IP address. Here the author describes a relatively simple proxy for individual software users - newbies IP hidden devices, as long as the "proxy server" and "proxy server" enter the correct proxy server address and port, you can use on the http proxy, QQ more suitable as IE and IP-leak case.
But to use a proxy server, also has some disadvantages, such as: will affect the speed of network communication; need to network a computer can provide proxy capabilities, if the user can not find such a proxy server can not use proxy (Find proxy server, You can use "proxy hunter" and other tools scan a network proxy server).
Although the agent can effectively hide the users IP, but advanced hacker can bypass the proxy, find each other's real IP address of the circumstances under which the user which method to use hide IP, also because in the circumstances.
Recommended links:
The accounting date of establishment of a free report - 1.1. Understanding the function of several r
Articles about Teaching And Training Tools
e-cology In the Pan Micro Series 27
Mito Xiu Funeral Flowers To Create Poignant Picture Of Non-mainstream
Premier Web Servers
m2ts YOUTUBE
blackberry divx
Best Inventory And Barcoding
Bonus Of Sight [2]
ts format
Policy of Spring
Clipboard Tools reviews
Fireworks produced blue and white porcelain button
Master is not highly educated does not mean that high-income elite
"Deceiving" Or "enlightened Approach"
Competitive Intelligence, the fourth competition
Vob to youtube
No comments:
Post a Comment