Hiding IP addresses does not allow attackers to exploit this vulnerability easily.

Source: Internet
Author: User

Generally, hacker attacks start with IP addresses. First, obtain an IP address, and then analyze and test the IP address accordingly. If a vulnerability is discovered from this IP address, then you can launch the attack. If you hide an IP address, you can avoid hacker attacks to some extent. Below we will introduce several common IP address hiding methods, and hope to help you.

Use proxy

Proxy is the most common method to Hide IP addresses. After proxy is used, others often see the IP address of the proxy server, rather than the real IP address. Many software now provide Proxy support functions, such as IE browser, QQ, MSN, and Flashget. However, the premise of using a proxy is that you must find a suitable proxy server. In addition to obtaining it from the website that specifically publishes the proxy, you can also use specialized software to search for it, such as the proxy hunter.

Although the use of a proxy server can effectively hide the real IP address, there are also many disadvantages, such as affecting the speed of network communication, because data must be transferred through the proxy server ", some proxy servers are also used by many people. In addition, using a proxy is not absolutely secure. hackers who have a deep understanding of the network can still bypass the proxy and find the real IP address of the other party.

Use software

There are some software dedicated to hiding IP addresses on the network. For example, for the "packet analysis method", you can use the special software "Norton Internet Security" to remove the packet header IP information sent. However, this software consumes a lot of resources, reduces the speed of reflection, and may also be affected when accessing some forums or websites. Of course, there are many other tools for hiding IP addresses, which will not be described here.

Stepping Stone

The principle of using the stepping stone is actually to use a trojan program to implant the trojan program into another person's computer, and then use the computer to access the Internet through port redirection, from the outside, the IP address is the IP address of the computer rather than the real IP address. This method is actually to manipulate others' computers. We recommend that you do not use it maliciously.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.