Home PC Games Linux Windows Database Network Programming Server Mobile  
  Home \ Linux \ Learning how to teach safety system to prevent your own IP leakage     - Binary search -Java achieve (Programming)

- JDK comes with tools jinfo (Linux)

- Copy and paste in Linux terminal and Vim (Linux)

- Security matters and practical Linux System (Linux)

- Linux environment Duplex (multi-machine) automatic mutual backup scheme (Linux)

- MongoDB 2.6 deployment replica set + partitions (Database)

- MySQL query optimization: profile function (Database)

- MySQLbinlog combat on using data recovery (Database)

- Try the command ip, ifconfig is obsolete under Linux (Linux)

- Learning C language pointer essays (Programming)

- Download Manager uGet 2.0 installed in Debian, Ubuntu, Linux Mint and Fedora (Linux)

- Analysis of MySQL High Availability (Database)

- sa weak passwords intrusion prevention (Linux)

- Shutdown - an advanced shutdown artifact (Linux)

- Linux operating system security tools of the Logs (Linux)

- How to avoid two Chrome icon appears in ELementary OS Freya (Linux)

- VMware 8 installation configuration Win7, CentOS-7 Wizard (Linux)

- What is Unikernel? (Linux)

- Linux shell script to adjust the Task Scheduler (Linux)

- Linux gprof oprofiling and performance testing tools (Linux)

  Learning how to teach safety system to prevent your own IP leakage
  Add Date : 2018-11-21      
  Before the formal variety of "hacking", hackers will take all means to detect (you can also say "reconnaissance") each other's host information in order to decide what the most effective way to achieve their own ends. Take a look at how hackers learn the most basic network information - each other's IP address; and users how to guard against their own IP leakage.
Get IP
"IP" Net users as an important mark, a hacker first need to know. The method of obtaining more, hackers will vary depending on network conditions to take a different approach, such as: use the Ping command in the LAN, Ping each other in the network name to obtain IP; using IP version of the QQ displayed directly on the Internet. The most "cow", is the most effective way is to intercept and analyze each other's network packets. This is a Windows 2003 Network Monitor to capture network packets, the average user probably more difficult to understand those 16 hex code, and knowledge for understanding the network hackers, they can be found in the packet directly through the software and analytic intercepted after IP header information, and then based on that information for specific IP.
Hide IP
Although reconnaissance IP methods varied, but users can hide IP method also diverse. Take the deal with the most efficient "packet analysis" is concerned, it can be installed to automatically remove the sending IP packet header information of some software. However, use of these software some shortcomings, such as: it takes serious resources and reduce computer performance; affected when visiting some forums or websites; not suitable for Internet cafe users and so on. Now individual users hide IP using the most popular method should be using a proxy, since the rear using a proxy server, "URL forwarding" will send out packets have been revised so that the method "packet analysis" failure. Some easy to leak user IP network software (QQ, MSN, IE, etc.) support the use of proxy connect Internet, especially after using the QQ "ezProxy" and other proxy software to connect, IP version of QQ can not show the IP address. Here the author describes a relatively simple proxy for individual software users - newbies IP hidden device, as long as the "proxy server" and "proxy server" fill in the correct proxy server address and port, you can use a proxy for http, more suitable due to circumstances of IE and IP QQ leak.
However, using a proxy server, also has some disadvantages, such as: will affect the network speed of communication; requires a computer can provide proxy capabilities on the network if the user can not find such a proxy server can not use a proxy (when looking for a proxy server, You can use "proxy hunter" and other proxy server on the network scanning tools).
Although the agent can effectively hide the users IP, but also advanced hacker can bypass the proxy, find each other's true IP address, the user which method to use hide IP under what circumstances, but also because the case is concerned.
In addition the firewall can use IP hide the extent that there is a firewall such as ZoneAlarm hidden in the online IP functionality.
- MySQL server after an unexpected power outage can not start (Database)
- Android annotation support (Support Annotations) (Programming)
- CentOS 6.6 command-line automatic completion (Linux)
- Upgrading Oracle to (Database)
- Vim Getting Started Tutorial (Linux)
- shellinabox: one uses AJAX Web-based terminal emulator (Linux)
- Create a DLL using MinGW and Attention (Programming)
- RHEL7 unattended automatic installation DHCP + TFTP + SYSLINUX + TFTP + Kickstart (Linux)
- MySQL remote connection settings (Database)
- Nginx Module Development - get user ip (Server)
- Linux, rename the file or folder (mv command and rename command) (Linux)
- Packages with Snort intrusion monitoring light (Linux)
- RAID configuration and management under linux (Server)
- CUDA (including GPU card driver) installation process under Ubuntu (Linux)
- Linux processes in memory and memory cgroup statistics (Linux)
- Programmer editor Vim (Linux)
- Make command tutorial (Linux)
- Ten linux version of the system (Linux)
- Sqoop data export import command (Database)
- Linux Getting Started tutorial: Experience QEMU virtual machine articles (Linux)
  CopyRight 2002-2022 newfreesoft.com, All Rights Reserved.