Home PC Games Linux Windows Database Network Programming Server Mobile  
  Home \ Linux \ Learning how to teach safety system to prevent your own IP leakage     - Linux system network security tools sudo Introduction (Linux)

- Oriented C ++ test-driven development (Programming)

- How to add a new resolution VirtualBox (Linux)

- Multipath configuration under Linux (Linux)

- Nodejs mysql pool Example (Programming)

- Firewall chapter of Linux server security configuration (Linux)

- Ubuntu 14.04 Trusty Tahr User How to install Banshee 2.9.1 (Linux)

- Transfer MySQL database to MariaDB (Database)

- Vim useful plugin: YouCompleteMe (Linux)

- Install Web-based monitoring tool: Linux-Dash (Server)

- Based LNMP + uWSGI deploy Django applications (Server)

- MySQL 5.7 can not log in problem (Database)

- What is Java EE (Programming)

- CoreOS Linux introduces Kubernetes kubelet (Server)

- Ubuntu Server (Ubuntu 14.04 LTS 64-bit) installation libgdiplus 2.10.9 error solution (Linux)

- Linux process management related content (Linux)

- How to install Ubuntu strategy game Wesnoth 1.12.0 (Linux)

- Android float ball and boot from the start (Programming)

- Understanding the type in C ++ bitset (Programming)

- Puppet subcommands Introduction (Server)

  Learning how to teach safety system to prevent your own IP leakage
  Add Date : 2018-11-21      
  Before the formal variety of "hacking", hackers will take all means to detect (you can also say "reconnaissance") each other's host information in order to decide what the most effective way to achieve their own ends. Take a look at how hackers learn the most basic network information - each other's IP address; and users how to guard against their own IP leakage.
Get IP
"IP" Net users as an important mark, a hacker first need to know. The method of obtaining more, hackers will vary depending on network conditions to take a different approach, such as: use the Ping command in the LAN, Ping each other in the network name to obtain IP; using IP version of the QQ displayed directly on the Internet. The most "cow", is the most effective way is to intercept and analyze each other's network packets. This is a Windows 2003 Network Monitor to capture network packets, the average user probably more difficult to understand those 16 hex code, and knowledge for understanding the network hackers, they can be found in the packet directly through the software and analytic intercepted after IP header information, and then based on that information for specific IP.
Hide IP
Although reconnaissance IP methods varied, but users can hide IP method also diverse. Take the deal with the most efficient "packet analysis" is concerned, it can be installed to automatically remove the sending IP packet header information of some software. However, use of these software some shortcomings, such as: it takes serious resources and reduce computer performance; affected when visiting some forums or websites; not suitable for Internet cafe users and so on. Now individual users hide IP using the most popular method should be using a proxy, since the rear using a proxy server, "URL forwarding" will send out packets have been revised so that the method "packet analysis" failure. Some easy to leak user IP network software (QQ, MSN, IE, etc.) support the use of proxy connect Internet, especially after using the QQ "ezProxy" and other proxy software to connect, IP version of QQ can not show the IP address. Here the author describes a relatively simple proxy for individual software users - newbies IP hidden device, as long as the "proxy server" and "proxy server" fill in the correct proxy server address and port, you can use a proxy for http, more suitable due to circumstances of IE and IP QQ leak.
However, using a proxy server, also has some disadvantages, such as: will affect the network speed of communication; requires a computer can provide proxy capabilities on the network if the user can not find such a proxy server can not use a proxy (when looking for a proxy server, You can use "proxy hunter" and other proxy server on the network scanning tools).
Although the agent can effectively hide the users IP, but also advanced hacker can bypass the proxy, find each other's true IP address, the user which method to use hide IP under what circumstances, but also because the case is concerned.
In addition the firewall can use IP hide the extent that there is a firewall such as ZoneAlarm hidden in the online IP functionality.
- Oracle 11g users to create, authorize and import dmp file (Database)
- How to enable fbcon in Debian (Linux)
- Linux-- sub-volume compression and decompression (Linux)
- Nginx + Tomcat static and dynamic load balancing and separation configuration essentials under Linux (Server)
- Manual cleaning Oracle audit records (Database)
- ThinkPad X220 Ubuntu 14.10 installed on fingerprint recognition (Linux)
- C language programming entry - Common operators (Programming)
- Close common port to protect server security (Linux)
- Zabbix monitors Nginx status (Server)
- Linux linux system security (Linux)
- How to fix apt-get update can not add a new CD-ROM error (Linux)
- MySQL 5.7 perfectly distributed transaction support (Database)
- Ubuntu 14.10 splash screen brightness settings (Linux)
- Qt shared memory interprocess communication (Programming)
- Oracle users to automatically increase the partition table (Database)
- Using shell users or virtual users to login to pureftpd (Linux)
- Udev: Device Manager for Linux Fundamentals (Linux)
- Iptables small summary (Linux)
- Oracle 11g on Linux system boot from the startup settings (Database)
- Based LNMP + uWSGI deploy Django applications (Server)
  CopyRight 2002-2020 newfreesoft.com, All Rights Reserved.