Breaking

Sunday, March 21, 2021

ANONYMITY | What hackers knows chapter two | Tech drop

 


Anonymity is that the state when nobody knows who you're on the web .
This State is employed by Hackers Worldwide to perform their activities in order that 
nobody can trace them.

Internet Protocol (IP)

Internet protocol is an unique numeric number of each individual internet user which may be wont to track your name, geographical location and your online activities.

An IP seems like this

225.2.665.233

This is your address and to the present address the info is being sent by your internet provider as data packets and this is often how your internet works.

Hackers hide their identification on the web to perform hacking activities in order that nobody can trace them.

How Hackers Hide their IP?

There are so many of ways to hide an IP, lets discuss about them.



VPN (Virtual Private Network)

VPN may be a network that's constructed by using public wires, usually the web.
To connect to a personal network, like a company’s internal network. There are variety of systems that permits you to make networks using the web because the medium for transporting data.


 


How VPN Works?

VPN Works as a medium between you and therefore the internet, the info is first received by the VPN server than it'll come to your computer.

Proxy Servers

A proxy or proxy servers is essentially another computer which is a hub through which internet requests are processed. By connecting through one among these servers, your computer sends your requests to the proxy servers which then processes your request and returns what you were wanting.

This way you IP isn't shown to the tracker.



TOR BROWSER (The Onion Reuter)

Tor browser is that the best software for anonymous browsing till date.
Even FBI can’t trace it easily. This works on layer IP basis. A circuit of various internet protocols is made (minimum 8 ) which acts as layers. (just like layers of an onion)
The data is first received by first IP than transferred to second than third then on. Then finally you get the info on your browser. this is often often the primary tool every hacker should have and surprisingly this is a free software. Very less people realize this browser. 



No comments:

Post a Comment