Thursday, September 16, 2010

Hide IP address detection and Experience


Formal various "hack" before, hackers will take all means to detect (you can also say "reconnaissance") each other's host information in order to determine what the most effective way to use their own purposes. To see how hackers learn the most basic network information - each other's IP address; and users how to prevent leakage of your own IP

First, access to IP

"IP" Net users as an important marker, a hacker first need to know. Method of obtaining more, hackers will be the situation for different networks to different methods, such as: use the Ping command in the LAN, Ping each other in the name of the network acquired IP; the Internet using IP version of the QQ displayed directly. The most "cow", is the most effective way is to intercept and analyze each other's network data packets. Using Windows 2003's Network Monitor to capture network data packets, may be more difficult for ordinary users to understand the hex code of 16, while the knowledge for understanding the network hackers, they can find and directly through the software analysis intercepted IP packet header information, then that information about a specific IP.

Second, hide IP

Although the method of multiple IP surveillance, but users can hide IP's method is also diverse. Take the deal with the most efficient "packet analysis" is concerned, it can be installed to automatically remove the sending IP packet header information of the "Norton Internet Security 2003". But using the "Norton Internet Security" some shortcomings, such as: it serious drain on resources and reduce computer performance; in some forums, or visit the Web site will be affected; not suitable for Internet cafe users and so on.

Now individual users hide IP using the most popular method is to use the proxy should be, because using a proxy server, "redirect service" will send out packets been changed, resulting in "packet analysis" methods fail. Some easy to leak user IP network software (QQ, MSN, IE, etc.) support the use of proxy connect Internet, in particular, QQ use "ezProxy" connection such as proxy software, IP version of QQ can not show the IP address. Here the author describes a relatively simple proxy for individual software users - newbies IP hidden devices, as long as the "proxy server" and "proxy server" enter the correct proxy server address and port, you can use on the http proxy, QQ more suitable as IE and IP-leak case.

But to use a proxy server, also has some disadvantages, such as: will affect the speed of network communication; need to network a computer can provide proxy capabilities, if the user can not find such a proxy server can not use proxy (Find proxy server, You can use "proxy hunter" and other tools scan a network proxy server).

Although the agent can effectively hide the users IP, but advanced hacker can bypass the proxy, find each other's real IP address of the circumstances under which the user which method to use hide IP, also because in the circumstances.






Recommended links:



The accounting date of establishment of a free report - 1.1. Understanding the function of several r



Articles about Teaching And Training Tools



e-cology In the Pan Micro Series 27



Mito Xiu Funeral Flowers To Create Poignant Picture Of Non-mainstream



Premier Web Servers



m2ts YOUTUBE



blackberry divx



Best Inventory And Barcoding



Bonus Of Sight [2]



ts format



Policy of Spring



Clipboard Tools reviews



Fireworks produced blue and white porcelain button



Master is not highly educated does not mean that high-income elite



"Deceiving" Or "enlightened Approach"



Competitive Intelligence, the fourth competition



Vob to youtube



No comments:

Post a Comment