Today i will write about ip address.This is most important to know everybody about this.So this is so important post to all.
Each IP address is unique, when you are using a specific IP address, it is not possible to use anyone else. The IP address is identified by the network user and also does it. If you are getting Internet services from the Internet Service Provider, you can only identify them separately through this IP address.
Find out the location of the network user. Each IP address indicates a specific place. So, from what place you are using the network, it is known through the IP address. IP Adderss are Binary Number, but for the sake of understanding, these are expressed with human readable signals (letters or numbers).
One of the most important things for hackers is this IP Address. Since the IP address is used to transfer the network user, it is very important to hide the IP address for the hacker. Otherwise, there is a chance to leak the hacker's position.
Two versions of IP address:
IPV4 and IPV6 are running. iP planners have published Internet Protocol Address with 32 bits and this System Internet Protocol is known as Vesrson 4 (IPV4) which is still being used. Because of the network expansion and lack of unused addresses, the new addressing scope, known as IPV6, was introduced in 1995. In IPV6, 128 bits are used to express each address. Internet Protocol addresses are used to store binary numbers system. Generally, people's text-appropriate signals are used to express binary numbers, for example, 180.210.130.13 (IPV4) and 2001: db8: 0: 1234: 0: 567: 1: 1 (IPV6).
IPV4 version
The IPV4 system requires 32 bits to publish each IP address. 32 bits are divided into 4 octets. Each is separated by octoc (.). Because of the network expansion, IPv6 is currently running 128-bit IP addresses.
IPV4 SubNet
At the beginning of the launch of internet protocol, network administrators split the IP address into two parts: one is the Network ID and the other is the Host ID. Network ID is the first 16 bits of the IP address or the first two octocations and the next 16 bits or two octets are host IDs. Network ID finds a specific network on the Internet Protocol and identifies the network device or computer with the host ID. We can compare this incident to home or home address. Think, you'll find a house or house. To find the building or the house, you will first be able to find the area (Network ID) and later you will be able to identify the building with the home ID. However, increasing the number of networks day by day, the problem of finding the network has been a problem. Because it was not possible to provide a unique network ID number for a large number of networks with one octocated. For this reason, the Classroom Network termination was introduced in 1981 by amending the Internet Addressing Specification.
classRoom Network Troubleshooting eliminates the difficulty of network ID numbers as well as simplifies sub-network designs. The first three bits of the first 8 bits or 1 oct in the IP address of the ClassRoom Network are called the IP addresses of the IP address. For public Unicast Addressing, three classes (class) A, B and C are made. The number of distinct network ID numbers to be given depends on the class. The number of network ID numbers is as low as the number of host ID numbers.
If a hacker knows your IP address, then think that you can get a lot of information from your location.
Many wonder how your IP address will be barred if your phone does not give it to anyone, you are actually creating misconceptions in your mind. The current technology has gone a lot, do not create unnecessary misconceptions in mind, due to your inadvertency, your IP address is collected by hackers.
You might not know about one thing, but many of us use Google to click on our favorite pictures and download them.
Many hackers keep Tracking Link in this link, as you click, you are in a country and you go to your IP address in the hacker's hand, now it may be that a hacker is tracked by a company like Google!
It is said that information technology is now a great deal, only the link from Google collects the hackers and creates a Tracking link in their special system links, which gives them two benefits.
They can create a Tracking Link and redirect it to Google's picture or another website by giving it to anyone, thus collecting an IP address.
And the link that's Google's original is that you just click
I will suggest you to enter the link using VPN before clicking on any unknown link.
I use VPN to check my IP address which VPN has given me, and let me check it out. Please note:
Only this information can be shown more information, so you can apply VPN before entering the unknown unknown link.
Now, if you want to see your IP address, you will see your IP address and you will see some information and the same as the screenshot below.
I will give you the link below. If you link below, you will see some information like your IP address and screenshot.
You can use VPN for security on the Internet because VPN will help hide your IP address. However, if you use VPN but you can access all the information VPN Administrators on your phone, then you will definitely consider yourself willing to do so.
The vPN's full form is Virtual Private Network. It's easier said than the name of a term. Basically you have your device or computer; Browsing the web by inserting someone else's network inside. Anyway; Whatever you do, it seems that the work you have been using is from the network you used. In other words; When you are connecting to VPN, you are your; Their IP is hidden by their IP's IP. But you're going through another network, you have some risks; So advice is to use Paid VPN. The question is: What is the free VPN selling our data? Do they open your original IP? The answer is that this can happen. So use my recommendation Paid VPN. Paid VPNs are usually [logless] logles; That means they do not store any information; So they will not leave any IP or open any request.
CyberGhost VPN, Nord VPN and Express VPN can be nice three options for you.
Some questions about Web Proxy
The web process works exactly the way VPN works using web technologies. Here web traffic is flowing with a proxy server. Your IP is hidden here by the IP of the Proxy server.
However, there is a difference between Proxy and VPN:
First, this network is not an encrypted network. Although your IP is being hidden by the proxy; Yet it is possible to recover by ISP, the government. not only that; Some websites may show your original IPO via Flash / JavaScript. Secondly, here browser will pass you through browser traffic. Manually install the IP of the Proxy Server from the settings of the browser.
How to Setup Web Proxy in Browser
Find out free web technologies such as PremProxy etc. Using your own country's provocative server, it will be faster for you; However, using another country will be relatively low speed.
Hopefully I can understand the details of your IP address today.
microtask.apk
0 Comments