03-28-2006, 12:57 AM | #1 |
Captain
182
Rep 737
Posts |
Can IP Addresses be used against you?
Hey, I was fooling around with wikipedia.com. I was amazed that anyone can edit any article to make it more helpful. Well anyway, like i said I was playing around and just now I noticed that my IP address was logged and it's now posted under the revisions for the particular article.
Can someone get a hold of this and use it against me somehow? I know that your IP address is logged on pretty much every site you go to, but this is creeping me out a little bit. Can anyone offer any insight? |
03-28-2006, 01:13 AM | #3 | |
Captain
182
Rep 737
Posts |
Quote:
|
|
Appreciate
0
|
03-28-2006, 01:16 AM | #4 |
auto pilot
279
Rep 822
Posts |
I really can't tell you since I don't know much about it myself. I doubt you really have much to be worried about, if it was that much of an issue, you'd know. I think there is a lot you have to be careful about divulging over the internet, I've seen and heard some very "scary" things. Myspace especially, I can't tell you how many "freak incidents" both freinds and acquiantances of mine have had on that site, it's a mess. I dont' know how I'd handle it if I were a father and had a daughter I knew used the internet everyday, too many whacky things and too many whacko people. But I don't live in a shell.
|
Appreciate
0
|
03-28-2006, 01:27 AM | #8 |
Major General
3659
Rep 9,783
Posts |
Internet Protocol- it's a set of rules that computers follow. The Internet Protocol address is like your social security number. For dial-ups it changes every time you go online. But for broadband it's fixed.
Yeah you need to know the IP address. |
Appreciate
0
|
03-28-2006, 01:33 AM | #11 | |
Major General
3659
Rep 9,783
Posts |
Quote:
There's not much you can do. If they want to they will hack into your comp. You can use programs like Norton Internet Security or McAffee to help protect your computer. There is no way to eliminate the threat unless you have a highly advanced encryption program. The highest is 256 bit I think but only the government have that. Then again, if they wanted to, they can find a way. |
|
Appreciate
0
|
03-28-2006, 01:39 AM | #13 |
Major General
3659
Rep 9,783
Posts |
I honestly dont know. I think it's like a customer database. They wanna know how many people log on to their site I guess. Anyone here following the GOogle case? I think it's similar to it.
|
Appreciate
0
|
03-28-2006, 01:40 AM | #14 |
One of my two dachshunds:
56
Rep 663
Posts |
If you have a firewall, up-to-date virus scanner, and up-to-date OS (e.g. WinXP with the latest updates at all times) it is ridiculously hard for any hacker to do any harm to you, regardless of their tools.
The IP address is crucial for many viruses including Trojan Horses. TH's, in my opinion, are the most fatal viruses because not only can your potential data be lost but everything on your computer can be stolen. Trojan Horses are planted into your computer through infected files/viruses and when the "controller/seeder" of the virus knows your computer, all he/she needs is your IP address to log into your computer and have complete access. It's funny because I used to do this back in middle school - on the day our final project research papers were due, I showed up to class with the exact same copy of my friend's research paper (of course I did my own, but just for kicks) and I showed him my (copied) paper. Back in the days, the IP address is also enough for nukers to bombard that particular address with "corrupt" packets over the internet that would actually crash the user's computer. Today's latest OS and firewalls prevent this from happening though. Even today's trojan horses are so advanced that once they are seeded/activated on your computer, they beacon your IP address to specific TH controllers out there so that despite you never revealing your IP address, they can still obtain it and access your computer. If you are seriously concerned, a simple phone call to your ISP requesting a change in IP address will fix the problem...assuming you do indeed have a static IP.
__________________
I'm sorry about my outlandish behavior - there's too much blood in my alcohol system.
|
Appreciate
0
|
03-28-2006, 01:40 AM | #15 | |
auto pilot
279
Rep 822
Posts |
Quote:
|
|
Appreciate
0
|
03-28-2006, 01:43 AM | #16 | |
Major General
3659
Rep 9,783
Posts |
Quote:
He could but everytime he logs onto wikipedia his IP will be logged again. Like squawks mentioned, you can use firewalls to help protect it. I have firewall, anti-spyware, hackers, and internet security on all my computers. You can set your privacy levels as well. Dont know for sure how much that will help. |
|
Appreciate
0
|
03-28-2006, 01:44 AM | #17 | |
auto pilot
279
Rep 822
Posts |
Quote:
You must be a sadist. LoL. I'm guessing that if someone were to have acquired a Trojan virus(still not exactly clear how easily that can be done?) that it would only be a small window of time before the symptoms begin to show. You'd know if someone hacked their way into your comp. |
|
Appreciate
0
|
03-28-2006, 01:45 AM | #18 | |
auto pilot
279
Rep 822
Posts |
Quote:
|
|
Appreciate
0
|
03-28-2006, 01:46 AM | #19 | |
Captain
182
Rep 737
Posts |
Quote:
But thanks, Squawks! I feel a lot better. I'm going to call the ISP first thing tomorrow and see what they say. Thanks again! |
|
Appreciate
0
|
03-28-2006, 01:48 AM | #20 |
Major General
3659
Rep 9,783
Posts |
Trojan Horses can be sent via emails. This is the reason why I dont open emails that I dont know. They can even come with pictures or documents your friends send you over AIM. There's the Trojan Worms that 's pretty fucked up. It spreads like a bitch all over your computer. It's also hard to get rid of cus it's a worm. It has many parts.
|
Appreciate
0
|
03-28-2006, 01:50 AM | #21 | |
One of my two dachshunds:
56
Rep 663
Posts |
Quote:
Almost all of today's viruses are installed into your computer without you knowing. For obvious reasons. Trojan Horses work the exact same way. People download programs, install it, carry on with their lives. Hackers can embed their viruses into such programs. Once the TH is in, the user never knows. Once the TH's seeder logs into the user's computer, the user STILL is unaware. The seeder can, from that point, control the user's computer or simply steal/delete crucial files. Now, if the seeder makes the user's cdrom drive open/close, move the user's mouse pointer, or spawn random system messages on the user's screen, then that will obviously let the user know that he's been infected with some sort of virus. But the stealthy seeder isn't stupid. He goes in, copies personal/important files, leaves. If he wants to impart serious damage, he permanently deletes important files off of the user's computer. Note that all the while this is happening, the user is carrying about his/her typical computer tasks as normal...and the ONLY way to tell something is awry is if you are monitoring your bandwidth (e.g. through a very good firewall).
__________________
I'm sorry about my outlandish behavior - there's too much blood in my alcohol system.
|
|
Appreciate
0
|
03-28-2006, 01:51 AM | #22 | |
auto pilot
279
Rep 822
Posts |
Quote:
|
|
Appreciate
0
|
Post Reply |
Bookmarks |
|
|