>>FrEnZy<<
Spy
- Joined
- Mar 15, 2005
- Messages
- 581
- Reaction score
- 0
I need to know how to change my IP adress, and what kinds of consequences will result from changing my IP adress. Anybody know how to do it?
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: this_feature_currently_requires_accessing_site_using_safari
God, that Jackson guy, or whatever, must be right, that actually brought a smile to my face. Creepy.Terminas said:You could always kill some random family and take their computer. That usually works for me.
To the first question: More than likely yes, depends on how well written the trojan is. The coder could have made it report to his computer with your IP. Or a poorly coded one he'd have to know your IP before hand.>>FrEnZy<< said:what if I had a trojan on my computer and I used dial-up. Will someone be able to access my computer if I reconnected and my IP changed?
And how are trojans implanted into your computer? If I formatted my computer can I be certain that the torjan will be wiped out also?
Laggy? Chances are the attacker would just be remotly running commands on your computer or log keys, which requires only a few bytes of info to be sent.xLostx said:people would be able to connect but it would be extremely laggy cuz you have dial up, but attackers would have to know your IP and what port to connect through. trojans get on your computer by you accepting a file and trojans most commonly end in a .exe file extension, once you run it then the trojan works its magic and does whatever it was designed to do. anti-viruses should pick up most trojans anyway, but yeah if you formatted your hard drive that would take care of it but I wouldnt jump to any conclusions.
if the attacker is using a program like sub7 or any other popular trojan program, then there are lots of options including ss's of what the user is looking at, keyloggers, and other fun stuff....sending that kind of information back in terms of ss's or activating their webcam, then it would be laggy on a dial up users. but it depends on what the trojan does.WhiteZero said:Laggy? Chances are the attacker would just be remotly running commands on your computer or log keys, which requires only a few bytes of info to be sent.
Well, that would be ok if you were on broadband, but with dial-up he'd have to disconnect and re-login to his ISP.Milkman said:MSDOS prompt
ipconfig
ipconfig/release
ipconfig/renew
I dunno, been awhile since I messed with it.
Those are all options yes. But keylogging wouldent be laggy since it's text and usualy the trojan would store it in a file that the attacker would download at a later time, so he dosent have to stream it. Screenshots would be another story though, so yah. Depends on what your doing, but alot of the fun stuff dosent use alot of bandwidth. (to repeat what you just said. lol)if the attacker is using a program like sub7 or any other popular trojan program, then there are lots of options including ss's of what the user is looking at, keyloggers, and other fun stuff....sending that kind of information back in terms of ss's or activating their webcam, then it would be laggy on a dial up users. but it depends on what the trojan does.
>>FrEnZy<< said:oh one more question, How, and by what means can others attain my IP adress?
>>FrEnZy<< said:Okay, so bascially, the only way someone can get access to my computer through the internet is through a trojan horse, which can only come into my computer via an .exe file. The way to counter this porblem is to set up a firewall preventing trojans from getting into my system. Right?
>>FrEnZy<< said:how do I attain a NAT router? and what exactly are external attacks/
Five minutes...bliink said:No.
People can get into your machine through many exploits and security holes. If you plug an unpatched windows box to the net and leave it 20 minutes it'll be infected with something (probably a few things).
The best form of protection is a hardware firewall, and better than that is NAT routing.
NAT routers make you pretty much invincible except for trojans and external attacks (eg a DoS, router exploits, syn floods)
Chris_D said:Five minutes...
Pi Mu Rho said:pfft, a *nix box is only as secure as a Windows box by default. It's all down to the user to configure it properly.
Sulkdodds said:Damn you people with your technical stuff.
Sulkdodds said:Damn you people with your technical stuff.
If I had enough room I would SO sig that right now.bliink said:My dog gave me a gigabyte and it megahertz
dekstar said:If I had enough room I would SO sig that right now.
/me sets it as his MSN message
bliink said:You can buy a NAT router from any IT related store.. I wouldnt recommend it unless you know what you're doing though, because otherwise you'll end up here complaining that "steam doesnt work and what the hell is port forwarding?!"
External attacks = malicious activities targetted at you where the attacker is not on your system to begin with.