Is it possible for someone to use my IP?

gentobu

Golden Member
Jul 6, 2001
1,546
0
0
Can someone hack into your computer and hide behind your ip while doing things on the internet?
 

Gusfo0

Golden Member
Feb 21, 2001
1,049
0
0
Possibly if you have some sort of bounce software running (highly doubtful).

Or if they spoof your ip (also highly doubtful).

Maybe if you have some sort of trojan on your system that gives them access to your entire system, they could use it for outgoing traffic.
 

Soybomb

Diamond Member
Jun 30, 2000
9,506
2
81
Of course they can, if you ran a telnet server, had back orifice, an unsecured unix/linux/bsd system, etc they sure could. I'd recommend you download zonealarm if you think that is happening
 

Skyclad1uhm1

Lifer
Aug 10, 2001
11,383
87
91


<< Of course they can, if you ran a telnet server, had back orifice, an unsecured unix/linux/bsd system, etc they sure could. >>



...or any Microsoft product!




<< I'd recommend you download zonealarm if you think that is happening >>

 

xyyz

Diamond Member
Sep 3, 2000
4,331
0
0

I have a question about spoofing....

Is it possible for someone to spoof your IP while you're connected?
 

vegetation

Diamond Member
Feb 21, 2001
4,270
2
0
Also, if you have a wireless access point, it is easy for someone to use your internet connection, even if you have enabled 128-bit WEP encryption.
 

gentobu

Golden Member
Jul 6, 2001
1,546
0
0
Ok so now Im wondering if these trojans let hackers use your computer like a proxy server. where they can open a web/ftp program on thier computer then connect to mine and then use my ip from that point on.
 

j0lly

Platinum Member
Jul 30, 2001
2,885
0
0


<< Ok so now Im wondering if these trojans let hackers use your computer like a proxy server. where they can open a web/ftp program on thier computer then connect to mine and then use my ip from that point on. >>


I think I've seen it done using Subseven.
 

RSI

Diamond Member
May 22, 2000
7,281
1
0
Some trojans have more flexibility than others. So if the case is that you're infected with a trojan, there isn't really a way to tell how much can happen. But they can definitely make it look like you're doing things you're not. Or they could add files to your system, as well as remove them. You probably knew all that, though.

If you have reason to suspect someone has gained access to your system or someone is faking your IP address, first download and set up ZoneAlarm as previously suggested.

-RSI