Can Evildoers Find My Home Address by Ip?
In computer networking, an IP address (internet protocol address) is a unique number that devices use in order to identify and communicate with each other on a network utilizing the Internet Protocol standard. Sometimes this address is shortened to just "IP" as in "My IP is A.B.C.D". Any participating device (including routers, computers, time-servers, printers, internet fax machines, and some telephones) must have its own globally unique communicable address.
It's true that your IP address is no secret. It's a basic part of internet communication protocols to send your IP address whenever you connect to another site, request a web page, chat, play an online game, etc. Without your IP address, the computer on the other end wouldn't know where to send the reply.
There are many my IP websites which will tell you your public IP address. Some of them also have tools to lookup IP addresses and provide generalized location information based on IP to location databases. In some cases they can estimate the location of an IP address within a few miles. When you visit this site http://www.ipandmap.com, you can find your IP address and your local city map.
But that doesn't mean that evildoers can find your house if they know your IP address. Each time you go online (if you have dialup) or each time you start your computer (if you have cable or DSL connection) you will be assigned an IP address, randomly selected from a pool of IP's assigned to your Internet service provider (ISP).
So a person might be able to get a general idea of your geographic location, based on your IP address, by doing a lookup on the WHOIS database, but that will only tell them the physical location of your ISP -- not your home address. With enough resources and effort you may be able to be identified. So don't say or do anything that you don't want tracked back to you.
Related Tags: ip, anonymous, ip address, geo location, geo ip, mark ip on map, safe online
John Lee is the admin of www.aplusproxy.com
Your Article Search Directory : Find in ArticlesRecent articles in this category:
- What Is Spyware?
If you use a computer then there are certain things that you have to be educated about. Spyware is o - There's No Such Thing As The Perfect Password
Even though you can get advice on how to create the perfect password, it's important to realize that - Shopping Online For Contacts: Security And Privacy
The Fairness to Contact Lens Consumer Act, signed into law in 2004, empowered lens wearers with the - Step-by-step Procedure Of Ssl Certificate Installation
SSL certificates are used to transfer the private data entered on the user computer to the website o - Software Protection Versus Code Obfuscation - Stable Software Protection
Security of intellectual property is crucial for every business in today's modern reality. Competiti - Portable Mini Digital Video Recorder
Portable Mini Digital Video Recorder is one of the world's smallest high-resolution mini Digital Vid - Protecting Domain Name From Cyber Squatting And Hijacking
Before I go into details about protecting domain name you should first know that there is no busines - Finding Email Senders Using Reverse Email Lookup
Most of our email inboxes are flooded with so many solicited and unsolicited messages that it's ofte - Confidentiality With Secure Email
Confidentiality, in any business, is among the most significant key in order to keep a client. There - Covering Your Computer's Footprints
When you delete a file, email, or piece of internet history on your computer, where do you think it
Most viewed articles in this category:
- How Does Ssl Fit Into the Over Scheme of Internet Security?
Internet has become an integral part of our life. Most of us prefer to do maximum amount of transact - Tips of Security
Protecting private information Information is the lifeblood of most, if not all, modern organis - Your Security Awareness Iq
Article about security awareness: Are you aware of the need for security? Your awareness o - Information Security Endangered
Sour time is coming. Spy programs are stealing information more easily. The reason is weak algorithm - Internet Attack Methods
The U.S. Government's National Information Assurance Glossary defines Information Security as: Prote - Computer Viruses
In information security , computer virus is a manmade program or piece of code that is loaded onto y - The Top 7 Threats to your Computer in 2007
Now that the holidays are behind us, the cost-conscious among us will be looking for those "post-hol - In Reality, Spyware is Always a Threat
I received a spam email the other day and the subject said "Tired of reality shows? Make your ow - Security Using Public Internet Array Access
Internet comes to peoples lives and then suddenly comes truth, that WE CAN'T LIVE WITHOUT INTERNET. - Anti-virus Software Comparison Test
Virus.gr tested quite a few different software companies to see how they would stack up against each