Generally, hacker attacks start with IP addresses. First, obtain an IP address, and then analyze and test the IP address accordingly. If a vulnerability is discovered from this IP address, then you can launch the attack. If you hide an IP address, you can avoid hacker attacks to some extent. Below we will introduce several common IP address hiding methods, and hope to help you.
Use proxy
Proxy is the most common method to Hide IP addresses. After proxy is used, others often see the IP address of the proxy server, rather than the real IP address. Many software now provide Proxy support functions, such as IE browser, QQ, MSN, and Flashget. However, the premise of using a proxy is that you must find a suitable proxy server. In addition to obtaining it from the website that specifically publishes the proxy, you can also use specialized software to search for it, such as the proxy hunter.
Although the use of a proxy server can effectively hide the real IP address, there are also many disadvantages, such as affecting the speed of network communication, because data must be transferred through the proxy server ", some proxy servers are also used by many people. In addition, using a proxy is not absolutely secure. hackers who have a deep understanding of the network can still bypass the proxy and find the real IP address of the other party.
Use software
There are some software dedicated to hiding IP addresses on the network. For example, for the "packet analysis method", you can use the special software "Norton Internet Security" to remove the packet header IP information sent. However, this software consumes a lot of resources, reduces the speed of reflection, and may also be affected when accessing some forums or websites. Of course, there are many other tools for hiding IP addresses, which will not be described here.
Stepping Stone
The principle of using the stepping stone is actually to use a trojan program to implant the trojan program into another person's computer, and then use the computer to access the Internet through port redirection, from the outside, the IP address is the IP address of the computer rather than the real IP address. This method is actually to manipulate others' computers. We recommend that you do not use it maliciously.