WARNNING
IP Address is something that should never be given out amongst other personal information, I made some inquiries on Google and came up with some interesting information. I have signed on to many Oak Island chat-lines and I never being asked to disclose my IP Address. I was shocked to hear that by giving up your IP Address you become vulnerable to Hackers ,viruses that can snoop through your computer to obtain personal information. I was skeptical when a former endorsed oakislandtreasure.co.uk patron Sasha K. Iman (N4n224CCW) ventured off to start his own forum oakislandtheories.com it was his estrange history that made me cautious to ever take him as honest. I am just warning the public/Oak Island Treasure hunters about Sasha K. Iman's (N4n224CCW) scam solicitation to obtain your IP Address there is no reason to ever give your IP Address to him considering that he has a distrustful devious shady past. http://defensiveramblings.blogspot.com/
I have some IP crucial information that I obtain from websites for your protection from deceptive person(s) like deceptive Sasha K. Iman (N4n224CCW) by him using paranoia to potentially scam/extort you at a later date. DONT BE FOOLED
Referances
# How do these people find their victim? Well, first of all, they need to get hold of the victim's IP Address. Your IP (Internet Protocol) address reveals your point of entry to the Internet and can be used in many ways to cause your online activities many, many problems. It may not reveal you by name, but it may be uniquely identifiable and it represents your digital ID while you are online (especially so if you're on a fixed IP / DSL etc). With an IP address, a Hacker can find out all sorts of weird and wonderful things about their victim (as well as causing all kinds of other trouble, the biggest two being Portnukes/Trojans and the dreaded DoS ((Denial of Service)) attack). Some Hackers like to collect IP Addresses like badges, and like to go back to old targets, messing them around every so often. An IP address is incredibly easy to obtain - until recently, many realtime chat applications (such as MSN) were goldmines of information. Your IP Address is contained as part of the Header Code on all emails that you send and webpages that you visit can store all kinds of information about you. A common trick is for the Hacker to go into a Chatroom, paste his supposed website address all over the place, and when the unsuspecting victim visits, everything about your computer from the operating system to the screen resolution can be logged...and, of course, the all important IP address. In addition, a simple network-wide port scan will reveal vulnerable target machines, and a war-dialler will scan thousands of lines for exposed modems that the hacker can exploit. So now that you know some of the basic dangers, you're probably wondering how these people connect to a victim's machine? http://www.bleepingcomputer.com/tutorials/tutorial99.html
# How do these people find their victim? Well, first of all, they need to get hold of the victim's IP Address. Your IP (Internet Protocol) address reveals your point of entry to the Internet and can be used in many ways to cause your online activities many, many problems. It may not reveal you by name, but it may be uniquely identifiable and it represents your digital ID while you are online (especially so if you're on a fixed IP / DSL etc). With an IP address, a Hacker can find out all sorts of weird and wonderful things about their victim (as well as causing all kinds of other trouble, the biggest two being Portnukes/Trojans and the dreaded DoS ((Denial of Service)) attack). Some Hackers like to collect IP Addresses like badges, and like to go back to old targets, messing them around every so often. An IP address is incredibly easy to obtain - until recently, many realtime chat applications (such as MSN) were goldmines of information. Your IP Address is contained as part of the Header Code on all emails that you send and webpages that you visit can store all kinds of information about you. A common trick is for the Hacker to go into a Chatroom, paste his supposed website address all over the place, and when the unsuspecting victim visits, everything about your computer from the operating system to the screen resolution can be logged...and, of course, the all important IP address. In addition, a simple network-wide port scan will reveal vulnerable target machines, and a war-dialler will scan thousands of lines for exposed modems that the hacker can exploit. So now that you know some of the basic dangers, you're probably wondering how these people connect to a victim's machine? http://www.bleepingcomputer.com/tutorials/tutorial99.html
No comments:
Post a Comment