Enigmaxxx7
New member
What idiots people are to think that they can post ANYTHING they want to on the internet and not be found out. Sure there is freedom of speech on the internet. You can say what you want, but there are also consequences. If you post that you will blow up a federal building, you are free to post that. But don't be surprised if there are feds knocking on your door within the hour. Here is a crash course for those interested.
Note that each IP address is UNIQUE.
Once an IP address is captured, there are several methods of tracing the user.
* Determine who owns the network. IP addresses are distributed in blocks to network providers or private companies. By searching IP registration databases it is possible to determine who owns an IP address block. Databases are available on the Internet for the Americas, Europe, and Asia-Pacific regions. Sophisticated computer break-ins sometimes include an attempt to erase the IP addresses captured by the log files to prevent this type of lookup.
* Perform a "reverse lookup." This converts the IP address into a computer name [Example: convert 206.156.18.122 into www.consumer.net]. This is used to determine if a computer is part of a registered Internet domain.
* Conduct a Traceroute. When information packets travel through the Internet they pass through several computers in a hierarchical fashion. Normally packets pass from the user to their Internet Service Provider (ISP) until it reaches the user's "backbone" provider. It then transfers to the destination "backbone " provider down to the ISP of the destination computer and finally to the intended recipient. It is often possible to determine an approximate physical location of an IP address in this fashion. It is also possible to determine the computer's ISP and/or network provider even if the computer itself is not part of a domain. This is usually how junk e-mail or "spam" is traced.
* Review domain registration information via the "WHOIS" databases. Domain registration information is available via the Internet by performing a WHOIS on the domain name portion of the computer name [Example: for www.consumer.net perform WHOIS CONSUMER.NET to obtain the registration information].
* Search the Internet for the IP address and/or computer name. It is often possible to find matches from users making public postings on discussion boards or from web sites that leave their log files open to the Internet. Of course, web site owners and/or banner networks could have additional non-public information based on activities at their web sites.
OK that's enough. So feel free to SAY WHAT YOU WANT. Just know that we can find out who you are. You can't hide behind the mask of a screen name.
Unity
Computers connected to the Internet must speak the "Internet language" called the "Internet Protocol" or simply "IP." Each computer is assigned a unique address somewhat similar to a street address or telephone number. Under the current system there are four numbers that range from 0 to 255 (Example: 206.156.18.122). Every computer, whether it functions as a web site, is being used by a web surfer, is a mail server, and/or is used for any other function, has an IP address so it can communicate across the Internet. Communication is accomplished by sending pieces of information called "packets" that include the IP address of the destination computer.
Note that each IP address is UNIQUE.
Once an IP address is captured, there are several methods of tracing the user.
* Determine who owns the network. IP addresses are distributed in blocks to network providers or private companies. By searching IP registration databases it is possible to determine who owns an IP address block. Databases are available on the Internet for the Americas, Europe, and Asia-Pacific regions. Sophisticated computer break-ins sometimes include an attempt to erase the IP addresses captured by the log files to prevent this type of lookup.
* Perform a "reverse lookup." This converts the IP address into a computer name [Example: convert 206.156.18.122 into www.consumer.net]. This is used to determine if a computer is part of a registered Internet domain.
* Conduct a Traceroute. When information packets travel through the Internet they pass through several computers in a hierarchical fashion. Normally packets pass from the user to their Internet Service Provider (ISP) until it reaches the user's "backbone" provider. It then transfers to the destination "backbone " provider down to the ISP of the destination computer and finally to the intended recipient. It is often possible to determine an approximate physical location of an IP address in this fashion. It is also possible to determine the computer's ISP and/or network provider even if the computer itself is not part of a domain. This is usually how junk e-mail or "spam" is traced.
* Review domain registration information via the "WHOIS" databases. Domain registration information is available via the Internet by performing a WHOIS on the domain name portion of the computer name [Example: for www.consumer.net perform WHOIS CONSUMER.NET to obtain the registration information].
* Search the Internet for the IP address and/or computer name. It is often possible to find matches from users making public postings on discussion boards or from web sites that leave their log files open to the Internet. Of course, web site owners and/or banner networks could have additional non-public information based on activities at their web sites.
OK that's enough. So feel free to SAY WHAT YOU WANT. Just know that we can find out who you are. You can't hide behind the mask of a screen name.
Unity