I always hear people saying stuff like if someone gets your IP, they can access your computer. I fail to see how that could work, unless you had the port too, but even then it would be difficult, right? Can someone explain how please?

I always hear people saying stuff like if someone gets your IP, they can access your computer. I fail to see how that could work, unless you had the port too, but even then it would be difficult, right? Can someone explain how please?
i'm out of touch, i'm out of love
i'll pick you up when you're getting down
and out of all these things i've done
i think i love you better now
Not really ;/
Most people have only heard of the phrase and dont understand what IP even stands for or what it can be used to do. It means Internet Protocol and most simple things anyone can do with it using telnet are blocked by nearly every safeguard program even xp has built in functions to reject them.
You need someones IP to successfully use a trojan but you also need to successfully deploy a remote file to that person which means you have a portal from which to control their computer from yours. You need trojan software to do this though and most software these days have code snippets which are recognised by most major firewall's and safeguards ie norton and blackice etc.
Most people that claim to damage you by using your ip are full of nonsense, there are other ways to gain access to a persons computer such as exploiting vulnerabilities in software such as windows media player but it takes a certain degree of knowledge and skill to do so and I doubt any teens on this forum can (no offence intended)
ye, you cant really hack with it, there is ways that i know, but not really..
You can use telnet, but it hard and you need to know how to use it.
Most people have only heard of the phrase and dont understand what IP even stands for or what it can be used to do. It means Internet Protocol and most simple things anyone can do with it using telnet are blocked by nearly every safeguard program even xp has built in functions to reject them.
You need someones IP to successfully use a trojan but you also need to successfully deploy a remote file to that person which means you have a portal from which to control their computer from yours. You need trojan software to do this though and most software these days have code snippets which are recognised by most major firewall's and safeguards ie norton and blackice etc.
Most people that claim to damage you by using your ip are full of nonsense, there are other ways to gain access to a persons computer such as exploiting vulnerabilities in software such as windows media player but it takes a certain degree of knowledge and skill to do so and I doubt any teens on this forum can (no offence intended)
If you dont have your firewall on, then your pretty stupid.
yes, if you got a trojan on your pc, the person needs your IP adds, like i said, you can also hack with it on telent![]()
Most OS's now have a pretty decent built in firewall for instance Vista's one is good. You cant "hack" an IP, I hate that term lol its used far too loosely on here. Telnet can only be used to do certain simple things, nothing that will cause damage.
Last edited by Cypher-; 22-11-2007 at 08:59 PM.
ye, i dunno what telent does to be honest,
My mate told me about it, maybe i try it sometime soon ;P
Considering you can change your IP, I'm failing to see how it works?
Yes but most internet users who use a constant connection such as broadband have this IP called a static ip which does not change for long periods of time such as when you reset your modem it wont change until the next time, or when you disconnect it and reconnect.
Want to hide these adverts? Register an account for free!