How do I prevent others from getting my IP address and machine name 10

Updated on technology 2024-03-15
11 answers
  1. Anonymous users2024-02-06

    1. Turn off public Wi-Fi connections: When using a public Wi-Fi connection, your IP address may be easily found by others, so it's best not to use a public Wi-Fi connection, especially if you need to protect your privacy.

    2. Use hidden name browsers: Using some anonymous browsers can protect personal privacy while accessing resources on the Internet.

    3. Turn off the mobile phone location function: The mobile phone location function can let your phone know your geographical location, but it will also expose your IP address. So, to protect privacy, you can turn off your phone's location feature.

    It is important to note that the above measures can protect your privacy to a certain extent, but they cannot completely prevent others from finding your IP address.

    On the Internet, anyone can obtain your IP address through various means, so when using the Internet, you should always be vigilant and pay attention to protecting personal privacy.

    There are many ways to prevent your phone from leaking your privacy, such as:

    1. Turn off or restrict location services.

    2. Use a secure chat app.

    3. Enable full-disk encryption.

    4. Set a strong password and remote tracking function <>

  2. Anonymous users2024-02-05

    Strengthen your password, check and kill viruses, maybe your computer has Trojans and other small programs, hehe, in short, protect your account and password for surfing the Internet.

  3. Anonymous users2024-02-04

    No need for a computer or no internet access!

  4. Anonymous users2024-02-03

    Check to see if your computer has fallen victim to a Trojan.

    Patch your system and install genuine antivirus software in a timely manner. This can be eliminated.

  5. Anonymous users2024-02-02

    According to relevant provisions, anyone who commits any of the following acts is to be detained for up to 5 days or fined up to 500 RMB. where the circumstances are more serious, they are to be detained for between 5 and 10 days, and may be concurrently fined up to 500 RMB

    1. Writing threatening letters or threatening the personal safety of others by other means;

    2. Publicly insulting others or fabricating facts to slander others;

    3. Fabricating facts to falsely accuse and frame others, in an attempt to quietly cause others to be criminally prosecuted or punished by the administration of public security.

    Legal basis: Article 42 of the "Public Security Administration Punishment Law of the People's Republic of China" Anyone who commits any of the following acts shall be detained for up to 5 days or fined up to 500 yuan. where the circumstances are more serious, they are to be detained for between 5 and 10 days, and may be concurrently fined up to 500 RMB

    1) Writing threatening letters or otherwise threatening the physical safety of others;

    2) Publicly insulting others or fabricating facts to slander others;

    3) Fabricating facts to falsely accuse and frame others, in an attempt to cause others to be criminally prosecuted or subject to public security administrative sanctions.

  6. Anonymous users2024-02-01

    Hello: First of all, click on the QQ panel of "Menu" - "Settings" - "System Settings" to directly enter the "System Settings" interface, enter **Settings, and check "Use Socket5 Firewall". Enter the free** address you are looking for in the Firewall Address, Port Number, Verify Username, and Verify Username and Password.

    The ** that can be used in QQ is SOCKS4 and SOCKS5 type, and the port number is: 1080. Well, fill in the IP address and port number (verify the username and password generally do not need to be filled), click the "Test" button, if the ** address you fill in is valid, the "** server is working normally" prompt box will pop up, otherwise it will pop up "Unable to connect to ** server" prompt.

    One point to pay special attention to is: after finding the ** server that is indeed available according to the above method, you must log out of QQ first, and then start QQ to log in again, so that the IP of QQ will be changed, otherwise the IP of QQ will not change. **Servers sometimes fail and you need to replace them with a new one.

    This method can only hide the IP of QQ, that is, others cannot find your real IP address through general QQ tools (but there is still a way for experts to find out your real IP).

    It is also important to note that this approach is useless against message bombs. Because the message bomb is no different from normal news, only for a much shorter period of time. Rejecting QQ message bombs is actually very simple, as long as you select "Reject messages from strangers" in the "System Parameters" Security Settings" item, if these two methods are used together, the possibility of attacking you through QQ is greatly reduced.

  7. Anonymous users2024-01-31

    1. According to 360 or other similar firewalls or security guards, enter the security protection center LAN protection, turn on or enable, prohibit ping and other operations;

    2. If you are not at ease, you can change the IP address, generally like the LAN can change the value behind the IP address; Broadband virtual dial-up Internet access is also a dynamically assigned IP address, which is not fixed.

    3. You can also turn off "Remote Assistance" through the "Properties" of "My Computer";

    4. Set the password of the computer login account, it is best to set the password of the highest user account of the system "administrator", and set the password of the "guest" account. Delete the rest of the accounts that are not used.

  8. Anonymous users2024-01-30

    You can set up a fake IP address, isn't there just two? It's really hidden.,Fake the main position.,They can't attack it.,And then there's that,You have to change a comprehensive anti-virus software.,360 software is very good.,Open all the functions inside.,,I'll use this.,As soon as there's a virus, it's directly killed,

  9. Anonymous users2024-01-29

    Our Song : Hello, you can prevent attacks with Kingsoft Firewall! Kingsoft Security Series.

  10. Anonymous users2024-01-28

    1. Router isolation.

    Router isolation mainly uses the ARP table to obtain the comparison between the current IP address and MAC address, and conducts legal comparison. Reprocess illegal access: Use the correct IP address to map the MAC address to overwrite the invalid IP-MAC entry. Sending ICMP-unreachable spoofed packets to illegally accessed hosts, interfering with their data transmission; Modify the access control list of the router to prohibit unauthorized access.

    2. Switch control.

    Switches are used for control, and each port of the switch allows only one host to access the network through that port, and host access from any other address is denied. But in today's relatively expensive switchboard, this is not the best way to go.

    3. Firewall and IP** server.

    The firewall is used to isolate the internal network and the external network, and the user accesses the external network through the first server, and the use of such a method is to put the IP anti-theft into the application layer to solve, and the IP management is processed as the management of user identity and password, so that the stolen IP address can only be used in the subnet, and it loses the meaning of theft.

  11. Anonymous users2024-01-27

    Go online and look for software for virtual IPs.

Related questions
8 answers2024-03-15

The comrade upstairs spoke in detail. To put it bluntly, the network identity is equivalent to the name of the computer in the local area network, and the IP address is the path used to connect the computer in the network.

4 answers2024-03-15

The conventional way is not good, because you can't communicate if you don't know the IP, and it's too troublesome to test them one by one, because there are too many IP addresses. Provide you with several methods, 1. Capture packets: Find a hub also called a hub (you can't use a switch), connect your computer to the hub, and then install a packet capture software on the computer (there is a famous packet capture software called sniffer, you can go to the network by yourself**), start to capture packets, and then connect the network cable of access control to the hub (be sure to open the packet capture software first, and then connect the access control), stop capturing packets after 10 seconds, and get the IP address of access control from the captured packets. >>>More

16 answers2024-03-15

XP is the last one inside the right click on my computer and the first hook is removed!

6 answers2024-03-15

Enter a question in the input box.

At the top of each page, you can see the "I want to ask a question" question input box, and enter your question in the question input box. >>>More