Blog Category

What is a Web Bug (Beacon)?

A web bug is also referred to as web beacon, pixel tag, clear GIF, invisible GIF. It is one of the techniques used in emails or web pages to check what the user has accessed. These are in most cases invisible and are used for web analytics. In most cases, web bug arrives in the form of an image and can be detected by the user only if the source code is checked. A web bug is small graphic and hence can work easily with low bandwidth or weak network connection.

[..]

How do you spy on someone's IP Address?

Most of us believe that our IP address can be tracked only by the Internet Service Provider. Did you know that there are multiple ways in which someone can spy on your IP address? Anybody knowing one of these techniques can easily reveal your IP address. To spy on your IP address, they do not need your permission. Spying on someone's IP address can be used to trace cyberbullying as well as bad intentions.

[..]

What is the private IP address?

The private IP addresses are the reserved IP address blocks that cannot be routed through the internet. Since private IP addresses are only intended to be used in private networks, they are not globally unique. The private IP address must be unique within its network (usually LAN) so that there is no conflict between two computers within its network. Due to scarce nature of IPv4 Address (i.e. approximately 4 billion IP addresses), IANA reserved private IP address blocks so that they can be used by any organization without registering them with IANA. The private IP address block can be used in homes, small businesses, or even medium and large enterprises to create their own network. Computing devices with a private IP address cannot be directly accessed from the Internet unless NAT (Network Address Translation) is used. The advanced network planning techniques have also enabled network planners to use same private IP address within different private networks thus allowing them to save valuable IP address space. A private address may also be referred to as a local IP address. It also enables to hide the identity of the users over the Internet.[..]

How accurate is IP-based Geolocation Lookup?

By finding IP address of yourself or a person you wish to lookup, the geolocation lookup tool provide you with an estimate of where this IP address is located. American Registry of Internet Numbers, also known as ARIN, maintains the Whois Database containing contact and registration information for IP addresses. The companies requiring IP addresses obtain and register them with ARIN, and those IP addresses obtained are assigned to their users and customers. Internet Service Providers (ISPs) assign a dynamic IP address to a user when their customers connect to the Internet. Since a company may be located throughout a large region (or a country), the accuracy of geolocation may vary depending on how they assign them to their users.[..]

How to find my computer's Private IP address?

To connect your computer to the Internet, you'll need an IP address. If your computer is directly connected to the gateway (or switch) provided by your ISP, your computer gets a public IP address from your ISP. However, if your computer is connected to the Internet via a router within your home network, your computer gets a private IP address from your router and your router gets the public IP address from your ISP. To learn more about public and private IP addresses, please read What is public and private IP addresses article.[..]

How to get around IP Ban?

IP ban is a block setup by a server to reject request made from a particular IP or range of IP addresses. The IP ban may have been implemented automatically due to abuse pattern detected by the server or placed manually by an administrator. IP ban is implemented to protect the server from abuse such as brute force attacks, block emails from known spammers and limit usage by users. IP Ban allows a server to ban an IP address from accessing a website, forum, email or game server.[..]

My IP address is hacked. What can I do?

Many readers of our website are contacting us for help on *allegedly* hacked IP address, and remedies for getting it back. One of the user is telling us his IP address used to be 64.3.x.y in Dallas and now it's 67.72.x.y located in Utah (per ip lookup); and hence his IP address is stolen, and his computer is running very slow and acting abnormal.[..]

What is the difference between a static and dynamic IP address?

An IP address is an address assigned to a device on the Internet. It is analogous to postal address where a letter is delivered, and an IP address is computer's address where internet traffic is delivered. An IP address is assigned to you by your Internet Service Provider (ISP). When you signup with your ISP, your ISP either assigns you a static IP address or a dynamic IP address depending on the contract. If you need to setup a web server or an email service, you'll need a static IP address. If you are just browsing an Internet, you may just get by with a dynamic IP address.[..]

What is the difference between public and private IP address?

A public IP address is an IP address that can be accessed over the Internet. Like postal address used to deliver a postal mail to your home, a public IP address is the globally unique IP address assigned to a computing device. Your public IP address can be found at What is my IP Address page. Private IP address, on the other hand, is used to assign computers within your private space without letting them directly expose to the Internet. For example, if you have multiple computers within your home you may want to use private IP addresses to address each computer within your home. In this scenario, your router gets the public IP address, and each of the computers, tablets and smartphones connected to your router (via wired or wifi) gets a private IP address from your router via DHCP protocol.[..]

What is IPv6 Address?

Internet Protocol Version 6 (or IPv6) is a successor of IPv4 Address standard developed by IETF, which is designed to solve IPv4 address exhaustion problem. IPv4 uses a 32-bit numbering scheme to represent an IP address, which has an address space of 232 or 4.3 billion. IPv6, on the other hand, uses 128-bit numbering scheme (2128) which has big enough address space for many decades to come. IPv6 is intended to replace the IPv4, but the introduction of CIDR (Classless Inter-Domain Routing) allocation scheme in 1993 within the IPv4 prolonged lifespan of IPv4 Addresses. With an anticipation of smartphones, tablets, smart appliances and other electronic devices joining Internet every day, IPv4 address space will eventually exhaust. As of May 2014 per Google Statistics, 96% of Internet traffic is IPv4 and only 4% is represented by IPv6. IPv4 and IPv6 are not interoperable by design, so the transition from IPv4 to IPv6 require "transition mechanism" such as Stateless IP/ICMP Translation, Transport Relay, 6rd and other IPv6 transition mechanisms to make them interoperable.[..]

Find IP addresses of a private network

You have a private or public network with servers and workstations that are assigned static and dynamic IP addresses (either private or public IPs). You assigned them the static IP addresses due to NAT (Network Address Translation) or for public access, and dynamic IP addresses via the DHCP. Even if you kept a good record of those assigned IPs, there are times when you want to find all IP addresses of networked devices. The following procedure may be used to determine IP addresses of networked devices that are connected to your network.[..]

What is IP Spoofing and how to avoid it?

IP Spoofing is a technique used to gain unauthorized access to machines, whereby an attacker illicitly impersonates another machine by manipulating IP packets. IP Spoofing involves modifying the packet header with a forged (spoofed) source IP address, a checksum, and the order value. Internet is a packet switched network, which causes the packets leaving one machine may be arriving at the destination machine in different order. The receiving machine resembles the message based on the order value embedded in the IP header. IP spoofing involves solving the algorithm that is used to select the order sent values, and to modify them correctly.

[..]

What is a MAC Address?

MAC, Media Access Control, address is a globally unique identifier assigned to network devices, and therefore it is often referred to as hardware or physical address. MAC addresses are 6-byte (48-bits) in length, and are written in MM:MM:MM:SS:SS:SS format. The first 3-bytes are ID number of the manufacturer, which is assigned by an Internet standards body. The second 3-bytes are serial number assigned by the manufacturer.

[..]

What is an IP Address?

The Internet Protocol Address (or IP Address) is a unique address that computing devices such as personal computers, tablets, and smartphones use to identify itself and communicate with other devices in the IP network. Any device connected to the IP network must have a unique IP address within the network. An IP address is analogous to a street address or telephone number in that it is used to uniquely identify an entity.[..]