Protect yourself: a way to effectively prevent your own IP leaks

  
Before formalizing various "hacking", hackers will take various measures to detect (or "reconnaissance") the other party's host information in order to decide which one to use. An effective way to achieve your goals. Let's see how hackers know the most basic network information - the IP address of the other party; and how users can guard against their IP leaks.

obtain IP

"IP" Net users as an important mark, a hacker first need to know. There are many ways to obtain, and hackers will adopt different methods for different network situations, such as: using the Ping command in the LAN, pinging the name of the other party in the network to obtain the IP; using the IP version of the QQ on the Internet to directly display. The most effective way is to intercept and analyze each other's network packets. This is a network packet captured by Windows 2003's network monitor. It may be that the average user is ugly to understand these hexadecimal codes. For hackers who know the network knowledge, they can find and directly parse the intercepted packets through the software. The IP header information, and then based on this information to understand the specific IP.

Hidden IP

Although there are many ways to detect IP, users can hide IP in the same way. For the most effective "packet analysis method", you can install some software that can automatically remove the IP information of the packet header. However, there are some disadvantages to using these softwares, such as: it consumes a lot of resources, reduces the performance of the computer; it will be affected when accessing some forums or websites; it is not suitable for users of Internet cafes and so on. Nowadays, the most popular method for individual users to use hidden IP should be to use a proxy. Since the proxy server is used, the "addressing service" will modify the sent data packet, causing the "packet analysis" method to be invalid. Some network software (QQ, MSN, IE, etc.) that easily leak user IP support the use of proxy to connect to the Internet. In particular, QQ uses the proxy software such as "ezProxy" to connect, and the IP version of QQ cannot display the IP address. Here I introduce a simple agent software that is more suitable for individual users - network novice IP hidden device (Figure 2), as long as the "proxy server" and "proxy server" fill in the correct proxy server address and port, you can The use of proxy for http is more suitable for the case of IP leakage due to IE and QQ.

but using a proxy server, also has some disadvantages, such as: will affect the speed of network communication; need a computer can provide proxy capabilities on the network, if users can not find such a proxy server can not use a proxy (When looking for a proxy server, you can use a tool such as "Agent Hunter" to scan the proxy server on the network).

Although the agent can effectively hide the users IP, but also advanced hacker can bypass the proxy, find each other's true IP address, what method to hide IP users under what circumstances, but also due to circumstances s.
Copyright © Windows knowledge All Rights Reserved