1 / 9

How Your IP Address Can Be Used to Hack You

An IP address is a unique address used to identify a computer and communicate with other computers. Hacking through a public IP address is also almost impossible. Let’s check how my IP address can be used to hack you<br>https://virily.com/technology/how-your-ip-address-can-be-used-to-hack-you/

Download Presentation

How Your IP Address Can Be Used to Hack You

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. How Your IP Address Can Be Used to Hack You

  2. Introduction ‘If someone has my IP address, what can they do with it?’ All of us have asked this question at some point in our lives. The fear of being hacked is ever present and we keep looking for ways to safeguard our web presence. However, there are always methods hackers can use to compromise your personal information.

  3. IP Address: Your Network Marker As you might know, each computer or device connected to the internet (or any network for that matter) is assigned an IP address. As an internet user, you need this IP address for searching information on the web, shop for stuff, communicating with other people using email and a host of other things.

  4. Ports In a computer network is also known as a TCP/IP network, the interaction between your programs and the network takes place through a group of electronic conduits. These conduits are called ports and each port is identified by a number unique to it.

  5. Programs/Applications Your system’s network software is the interface that brings together the applications you are running and the network they are connected to. The network software needs to know which application an incoming data packet is meant for.

  6. A House with Different Rooms So now there are IP addresses – which are like an address but on your computer, ports – which are like doorways to rooms, and programs – which are akin to the rooms in a house.

  7. Sneaking In Through the Back Door Thankfully, each program (room) is slightly insular and does not share a connecting door with other programs (rooms) running on your computer. In case hackers get hold of your IP and use it to sneak in via the backdoor and into your program, that’s all they can do.

  8. Making Your IP Invisible To see if a VPN is working correctly, compare your IP addresses before and after switching on the VPN. If you do not know your true IP, just search for the term ‘what is My IP address’ using an internet browser of your choice.

  9. Contact Us Website:- http://www.myipaddress.host/

More Related