Hide IP

reason

The reasons for hiding IP can be divided into two categories: one is to protect one's privacy and avoid the leakage of one's information; the other is to avoid the capture of one's geographic location, especially to avoid trouble when engaging in illegal or unethical activities.

method

The first thing that needs to be stated is that in a computer network, if you want to transmit and receive data effectively, you must set the source IP and destination IP correctly. However, if we do not want our IP information to be detected by third parties or data recipients, we can take certain measures to increase the difficulty of discovery to a certain extent.

  1. Proxy IP, that is, setting an unreal IP address, so that it can still communicate in the computer network, and does not contain the information of the real IP.
  2. VPN, which is a technology in which VPN gateways are set at both the sender and the receiver to perform encryption. The destination IP and source IP of the data packet during transmission are set to the IP address of the VPN gateway, but the real IP still exists in the data. Inside the packet, if decrypted effectively, it will be discovered.
  3. Onion routing Tor is a technology that is widely used to hide IP, but it cannot completely ensure security. Although it is quite troublesome for third parties to trace, if a honeypot is set up by someone with ulterior motives for communication within the tor network. It's easy to break.

VPN

VPN is a virtual private network, which establishes a private network on a public network for encrypted communication. It is widely used in enterprise network. The VPN gateway realizes remote access by encrypting the data packets and converting the destination addresses of the data packets.

working principle

  1. Usually, the VPN gateway adopts a dual network card structure, and the external network card uses the public IP to access the Internet.
  2. Terminal A of network 1 (assumed to be the public internet) accesses terminal B of network 2 (assumed to be the company's intranet), and the destination address of the access data packet sent by it is the internal IP address of terminal B.
  3. The VPN gateway of network 1 checks its destination address when receiving the access data packet sent by terminal A. If the destination address belongs to the address of network 2, it will encapsulate the data packet. The encapsulation method varies according to the VPN technology used. At the same time, the VPN gateway will construct a new VPN data packet and use the encapsulated original data packet as the payload of the VPN data packet. The destination address of the VPN data packet is the external address of the VPN gateway of network two.
  4. The VPN gateway of network 1 sends the VPN data packet to the Internet. Since the destination address of the VPN data packet is the external address of the VPN gateway of network 2, the data packet will be correctly sent to the VPN gateway of network 2 by the route in the Internet.
  5. The VPN gateway of network 2 checks the received data packet, and if it is found that the data packet is sent from the VPN gateway of network 1, it can determine that the data packet is a VPN data packet, and depacketize the data packet. The process of unpacking is mainly to first strip the header of the VPN data packet, and then reverse the processing of the data packet and restore it to the original data packet.
  6. The VPN gateway of the network 2 sends the restored original data packet to the target terminal B. Since the target address of the original data packet is the IP of the terminal B, the data packet can be sent to the terminal B correctly. From the perspective of terminal B, the data packets it receives are the same as those sent directly from terminal A.
  7. The process of processing data packets from terminal B back to terminal A is the same as the above process, so that the terminals in the two networks can communicate with each other.

Method to realize

  1. Windows built-in software enables VPN connections.
  2. VPN software
  3. Build your own free VPN platform, VPNBook and VPN Gate.
  4. Set up a VPN server on Windows.

IP proxy

An important application scenario of the proxy IP function is to solve the tension of IP resources, and it can also be used to hide the IP function.

Method to realize

  1. Windows built-in software
  2. Proxy IP Software
  3. other

Onion routing Tor

Tor is a typical hidden IP service. It can help hide IP. It is very difficult for a third party to detect specific objects, but it is not difficult to monitor any data packets inside the tor network.

Guess you like

Origin http://43.154.161.224:23101/article/api/json?id=326289268&siteId=291194637
Recommended