I have recently heard that hackers sometimes use what is known as an IP relay, so as to go undetected by their potential victim/s. Can you please explain to me exactly what an ip relay is and what it does AND how to effectively stop from being exploited by a hacker with an ip relay? For instance, IS it a piece of hardware? Software? or something altogether different?
This in short allows a hacker to request something, such as a webpage on your behalf.
They would either use your computer to surf porn, or hack another computer. It would then appear that you are hacking, and not the hacker hidden behind you. It's like a proxy sever, but simplified and uses command lines generally.
If you are protected by a firewall, they shouldn't be able to innitiate a connection in the first place and therefore you are protected unless they use brute force to crack your firewall - which is quite possible, but not very common on a home network.
To answer your question, it is software and runs mainly on linux boxes though windows versions can be obtained.
This thread is now locked and can not be replied to.