How does an IP relay work?

  megaman322000 11:23 10 Nov 2004
Locked

I have recently heard that hackers sometimes use what is known as an IP relay, so as to go undetected by their potential victim/s.
Can you please explain to me exactly what an ip relay is and what it does AND how to effectively stop from being exploited by a hacker with an ip relay? For instance, IS it a piece of hardware? Software? or something altogether different?

Thank you,

Mega

  megaman322000 13:56 10 Nov 2004

Just curious to know if anyone has an answer for me.

Thank you,
Mega

  megaman322000 22:26 10 Nov 2004

Aww, cmon guys, surely SOMEONE out there has an answer to my question. Please?

  megaman322000 22:26 10 Nov 2004

Aww, cmon guys, surely SOMEONE out there has an answer to my question. Please?

  megaman322000 22:26 10 Nov 2004

Aww, cmon guys, surely SOMEONE out there has an answer to my question. Please?

  Gaz 25 22:56 10 Nov 2004

that you mean TCP/IP relaying?

This in short allows a hacker to request something, such as a webpage on your behalf.

They would either use your computer to surf porn, or hack another computer. It would then appear that you are hacking, and not the hacker hidden behind you. It's like a proxy sever, but simplified and uses command lines generally.

If you are protected by a firewall, they shouldn't be able to innitiate a connection in the first place and therefore you are protected unless they use brute force to crack your firewall - which is quite possible, but not very common on a home network.

To answer your question, it is software and runs mainly on linux boxes though windows versions can be obtained.

Regards,

Gaz25

This thread is now locked and can not be replied to.

Elsewhere on IDG sites

OnePlus 5 review

Alice Saey's mesmerising animation for Dutch singer Mark Lotterman

iPad Pro 10.5in (2017) review

Comment booster votre iPhone ?