I P Address

Terry

Line Up and Wait
Joined
Apr 3, 2005
Messages
738
Location
LaCrosse
Display Name

Display name:
Terry
Hi everyone,

I was reading where it is now possible to fool caller I. D. on your phone.

Is it possible to fool people or systems on computer I. D. ?

I mean can I make my email look like it is from another computer and not my computer?

Just curious.

Terry
 
I have trouble grasping how the IP on a computer, which would be "hard wired" could be changed.

Is it possible to encrypt the IP address?

It seems, no matter what you do, the machine is still connected to the internet through a router. All have IP's. So, I guess you could re-route through several routers, but wouldn't you eventually come back to the original IP address?

Is there a "call back" feature on a computer where you can trace back where the data came from?

I have probably watched too many "crime" shows where the actor gets on the keyboard and, WA-LA, he is inside the DOD.

With all the IRS losing the emails, I was just wondering why some "computer guru" couldn't locate the emails.

Terry
 
anything you do on your computer can be traced back to that computer. Erroneous belief about changing IP addresses aside.
 
anything you do on your computer can be traced back to that computer. Erroneous belief about changing IP addresses aside.

True, but some things require a LOT more work than others. Look up "IP Spoofing".
 
The Internet connections that I have had in the past all defaulted to dynamic IP addressing, so that my IP address was often different when I checked it on different occasions. You had to pay extra if you wanted a static IP address. The one I had before this one would change whenever I cycled the power on the DSL modem. I haven't checked my current one.

From the conversation here, it sounds like that might have made it more difficult to identify my computer, but not impossible.
 
The Internet connections that I have had in the past all defaulted to dynamic IP addressing, so that my IP address was often different when I checked it on different occasions. You had to pay extra if you wanted a static IP address. The one I had before this one would change whenever I cycled the power on the DSL modem. I haven't checked my current one.

From the conversation here, it sounds like that might have made it more difficult to identify my computer, but not impossible.

It's not all that hard for the operator of a website to identify the specific computer.
 
It depends if you're trying to be someone else, or just trying to be autonomous.

Use the TOR browser and you're quite autonomous....

IP spoofing, to be someone else, is pretty simple too but you leave a trail.
 
Hi everyone,

I was reading where it is now possible to fool caller I. D. on your phone.

Is it possible to fool people or systems on computer I. D. ?

I mean can I make my email look like it is from another computer and not my computer?

Just curious.

Terry

Yes, its possible. Considering my IP was banned and I'm still able to post should tell you there are ways to do whatever you want.What is it that you are trying to do?
 
Sometimes they hijack an account and the leverage webmail to send on another's behalf.
 
Last edited:
If you have an IP phone you just enter whatever you want in a 'caller id' field on a web page.

As far as your IP address, the traditional way to spoof IP is to contract with a 'bot net', which is a networkd of 'pwnded' (owned) computers. A pwnded computer belongs to an innocent person who has unknowingly downloaded code which allows the evil doer to do what ever he wants with the victim computer, including sending email.

If you don't want to fool with a bot net then it's simple and legal to use a commercial virtual private network to log in to a web mail system from a distant computer. Most commercial vpn's don't keep logs. You may not be safe from the NSA, but going through a VPN effectively masks one from 99.9% of private sector actors.
 
I wasn't trying to do anything. Just curious how these so called "hackers" could fool the system.

If the IP is given randomly when the router is rebooted, how does 30,000,000 routers prevent from giving out two identical IP's? (Just 30 million as a guess.)

Does each router have a group of IP addresses to draw from?

Also, is there such a thing as a "spike" like in the James Bond movie. (No laughing)

Thanks,
Terry
 
Rather than get into the technical aspects of IP address assignments, routing, NAT, etc. think of it this way...

If you're trying to hide from someone, what you need is to go through someone's network that WON'T help the authorities trace you. The tech is not nearly as important as making sure the information needed to track you is hard to get.

Crossing country boundaries, especially if some of those countries aren't exactly eager to cooperate with your government, is probably helpful. As would be taking over computers that are innocent, but owned by people who will either not have logging information or will be slow to provide it. (Enter a company network in one location, establish a connection to another machine in the same network at a different location, exit from there, on to the next hop where you do it all again). Every time you do stuff like this, your origin IP address changes, or can, if you do it correctly.

Far easier is to just drive to a McDonald's with free wifi and do your hacking from there. :)
 
FWIW, the IP of your computer is likely neither unique nor fixed, especially on a home network. But the IP is only one part of your computer's ID on the internet. Your network interface has a MAC which is supposed to be unique in the universe.
 
I wasn't trying to do anything. Just curious how these so called "hackers" could fool the system.
Basically by bouncing your traffic off another computer. That's what TOR does, so do botnets...the difference is, with TOR, you have permission of the other computer to do it!

If the IP is given randomly when the router is rebooted, how does 30,000,000 routers prevent from giving out two identical IP's? (Just 30 million as a guess.)

Does each router have a group of IP addresses to draw from?
The protocol involved is called "Dynamic Host Configuration Protocol" or DHCP. Each network (all computers on the same side of a router) have a DHCP server (potentially multiple that share info) with a fixed "pool" of addresses to assign from, all defined by what addresses are allocated to the particular Internet Service Provider, or they use "private" addresses that can be duplicated in local networks, but not on the Internet at large (anything starting with 10.x.x.x, 172.16-31.x.x, 192.168.x.x). These "private" addresses have to be translated, generally at the point of connection to the Internet (your WiFi router).

Also, is there such a thing as a "spike" like in the James Bond movie. (No laughing)
If you know the IP address of a remote host, there are plenty of tools out there from less-than-reputable sources that will permit you to shut down that node. These are called "distributed denial of service" attacks, because they use the aforementioned botnets to have thousands of computers all overwhelm the target with traffic. Very difficult to prevent, but not impossible.
 
How is that coordinated, and by whom?

Each manufacturer of network cards receives a block of addresses (I think by the IEEE 802.3 committee), basically the first 2 bytes of the MAC address (so there are 65,536 of these blocks available), and they assign individual addresses within their block using whatever procedures they want to to ensure uniqueness.

Actually, MAC duplication isn't a huge issue, unless the duplicates live on the same "Level 2" segment. If there is a router between the devices, then duplicate MAC addresses are a non-issue entirely. But if you get two plugged into the same switch, it will cause all kinds of problems.
 
FWIW, the IP of your computer is likely neither unique nor fixed, especially on a home network. But the IP is only one part of your computer's ID on the internet. Your network interface has a MAC which is supposed to be unique in the universe.

Your MAC address never leaves your local network segment.
 
Thanks everyone, I learned a lot today.

Despite all of the trivial name calling and remarks, in the spin zone and hangar talk and the Liberals, this board has a lot to offer and one of the main reasons I keep coming back. :D

Thanks everyone,

Terry
 
not sure why the regular home user would need to understand how to change an IP address etc.
 
...Despite all of the trivial name calling and remarks, in the spin zone and hangar talk and the Liberals, this board has a lot to offer and one of the main reasons I keep coming back...

I keep coming back despite all the people who care whether other pilots are "conservatives" or "liberals." :p
 
FWIW, the IP of your computer is likely neither unique nor fixed, especially on a home network. But the IP is only one part of your computer's ID on the internet. Your network interface has a MAC which is supposed to be unique in the universe.

And that's not even taking into consideration all the data that web browsers make available to servers or that can be gleaned with a few snippets of JavaScript. A person who wanted true Internet anonymity would need to do more than use a Web proxy or an open WiFi connection.

-Rich
 
And that's not even taking into consideration all the data that web browsers make available to servers or that can be gleaned with a few snippets of JavaScript. A person who wanted true Internet anonymity would need to do more than use a Web proxy or an open WiFi connection.

-Rich

This.
 
Back
Top