Criminals have long employed the tactic of masking their true identity, from disguises to aliases to caller-id blocking. It should come as no surprise then, that criminals who conduct their nefarious activities on networks and computers should employ such techniques. IP spoofing is one of the most common forms of on-line camouflage. In IP spoofing, an attacker gains unauthorized access to a computer or a network by making it appear that a...

INTRODUCTION OF IP SPOOFING

(ī-pē spoof´ing) (n.) A technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host. To engage in IP spoofing, a hacker must first use a variety of techniques to find an IP address of a trusted host and then modify the packet headers so that it appears that the packets are coming from that ho...

INTRODUCTION AND IMPORTANCE OF IP SECURITY

In 1994, the Internet Architecture Board (IAB) issued a report entitled "Security in the Internet Architecture" (RFC 1636). The report stated the general consensus that the Internet needs more and better security, and it identified key areas for security mechanisms. Among these were the need to secure the network infrastructure from unauthorized monitoring and control of network traffic and the need to secure end-user-to-end-user traffic using authentication and encryption mechanisms. These concerns are fully justified. As confirmation, the 1998...

This article is about technical vulnerabilities.Aa request of my blog reader(sumit sinha). A zero-day (or zero-hour) attack or threat is a computer threat that tries to exploit computer application vulnerabilities that are unknown to others, undisclosed to the software developer, or for which no security fix is available. Zero-day exploits (actual code that can use a security hole to carry out an attack) are used or shared by attackers before the software developer knows about the vulnerability. The term derives from the age of the exploit....

FIND IP ADDRESS OF SENDERS

Find IP Address in GMail 1. Log into your Gmail account and open the mail. 2. To display the headers, Click on More options corresponding to that thread. You should get a bunch of links. Click on Show original 3. You should get headers like this: Gmail headers : Varun Look for Received: from followed by a few hostnames and an IP address between squarebrackets. That is be the IP address of the sender! 4. Track the IP address of the sen...

When you receive an email, you receive more than just the message. The email comes withheaders that carry important information that can tell where the email was sent from andpossibly who sent it. For that, you would need to find the IP address of the sender. Thetutorial below can help you find the IP address of the sender. Note that this will not workif the sender uses anonymous proxy servers. Finding IP address in Yahoo! Mail :-                  1. Log into your...

Some rule/tricks for Security at Cyber Cafes

AS we know every good thing comes with some bad thing,same case with internet it helped to make life easy but as well as it helped some criminal to do crime by using internet Computer and communications costs and casual use of Internet makes the growth of Cyber cafes in India and become are very popular.Due to increased Cyber attacks, the Cyber Cafe Users should follow some rules to become safe Internet user:- ---------------------------><------------------------------------------<>----------------------------------- Rule1: Never pass...