Re: Displaying the path to ISP provider
"SANTANDER" <santander@microsoft.news> wrote in message
news:uoYbNWhnIHA.5084@TK2MSFTNGP04.phx.gbl...
|
| "MEB" <meb@not
here@hotmail.com> wrote in message
| news:u6BGMmZnIHA.3532@TK2MSFTNGP05.phx.gbl...
| >
| > "SANTANDER" <santander@microsoft.news> wrote in message
| > news:eMk8ehVnIHA.944@TK2MSFTNGP05.phx.gbl...
| > |
| > | "MEB" <meb@not
here@hotmail.com> wrote in message
| > | news:egF7JwCnIHA.3512@TK2MSFTNGP03.phx.gbl...
| > | >
| > | > "SANTANDER" <santander@microsoft.news> wrote in message
| > | > news:OXQFFyAnIHA.5084@TK2MSFTNGP04.phx.gbl...
| > | > |
| > | > | "MEB" <meb@not
here@hotmail.com> wrote in message
| > | > | news:%23hnD6B7mIHA.4076@TK2MSFTNGP05.phx.gbl...
| > | > | > Ah, what is it EXACTLY that you want to know, and why?
| > | > | >
| > | > | > tracert {actual IP address}
| > | > | >
| > | > | > Perhaps what you really want to do is find the "services"
| > available,,
| > | > try
| > | > | > netinfo [a separate application] or one of the other network
| > discovery
| > | > | > tools
| > | > | > available.
| > | > | >
| > | > | > TAKE DUE NOTICE THOUGH: this may be seen as an attempt to hack
or
| > a
| > | > | > preliminary to a hack {like in illegal intent - this is blocked
by
| > | many
| > | > | > server AND/OR IS logged}.
| > | > | >
| > | > | > --
| > | > | > MEB
http://peoplescounsel.orgfree.com
| > | > | > --
| > | > | > _________
| > | > | >
| > | > | >
| > | > | > "SANTANDER" <santander@microsoft.news> wrote in message
| > | > | > news:u6Pjpz1mIHA.3400@TK2MSFTNGP03.phx.gbl...
| > | > | > |
| > | > | > | "MEB" <meb@not
here@hotmail.com> wrote in message
| > | > | > | news:%23tOIIazmIHA.4504@TK2MSFTNGP06.phx.gbl...
| > | > | > | >
| > | > | > | >
| > | > | > | > "SANTANDER" <santander@microsoft.news> wrote in message
| > | > | > | > news:exPD1mwmIHA.3400@TK2MSFTNGP03.phx.gbl...
| > | > | > | > | what is command to display full detailed path from my PC
to
| > ISP
| > | > | > router
| > | > | > | > where
| > | > | > | > | my pc gets internet from.
| > | > | > | > |
| > | > | > | > | Thanks
| > | > | > | > |
| > | > | > | >
| > | > | > | > Command: Open eyes, look at cabling and devices {grin}.
| > | > | > | >
| > | > | > | > IF you have a local network beyond a single device, or
| > perhaps
| > | when
| > | > | > using
| > | > | > | > ICS [meaning two or more computers sharing one connection],
| > then
| > | you
| > | > | > can
| > | > | > | > PING the local router address from the individual
| > nodes/computers.
| > | > | > | > Commands from the DOS prompt or CMD window:
| > | > | > | > > ping {router/gateway address}
| > | > | > | > > ipconfig /all /batch {drive:\folder\file name - creates a
| > text
| > | > file
| > | > | > of
| > | > | > | all
| > | > | > | > IP-addies}
| > | > | > | > > tracert {ip address of router or other nodes}- trace route
| > | > | > | >
| > | > | > | > Other commands:
| > | > | > | > cfgwiz32 - ISDN config
| > | > | > | > clicfg - SQL client config
| > | > | > | > cmmgr32 - Connection Manager
| > | > | > | > cmmon32 - Connection Manager Monitor
| > | > | > | > dcomcnfg - Distributed COM Configuration
| > | > | > | > fixmapi - MAPI Repair Too
| > | > | > | > nbtstat - Displays protocol statistics and current TCP/IP
| > | > connections
| > | > | > | using
| > | > | > | > NBT(NetBIOS over TCP/IP).
| > | > | > | > net - Network Diagnostics and commands
| > | > | > | > netstat - TCP/IP Netstat Command - Displays protocol
| > statistics
| > | and
| > | > | > | current
| > | > | > | > TCP/IP network connections.
| > | > | > | > netwatch - Net Watcher
| > | > | > | > route - TCP/IP Route Command
| > | > | > | > winipcfg - graphic IP configuration
| > | > | > | >
| > | > | > | > Installing the Resouces Kit [or individual components if
| > | possible]
| > | > | > gives
| > | > | > | a
| > | > | > | > few more:
| > | > | > | > netmon - network monitor
| > | > | > | > poledit - policy editor
| > | > | > | > pwledit - password editor
| > | > | > | > rpcpp - RPC Print Provider (RPCPP
| > | > | > | > regsrv - remote registry
| > | > | > | >
| > | > | > | > XP has some more:
| > | > | > | > bitsadmin - BITS administration utility
| > | > | > | > browstat - Browser Statistics Utility
| > | > | > | > dhcploc - Detects rogue DHCP server
| > | > | > | > dnscmd - DNS Command Line Admin Utility
| > | > | > | > getsid - {obvious}
| > | > | > | > httpcfg - http config util
| > | > | > | > ipseccmd - IPSec Command Utility
| > | > | > | > netcap - Generates a Network Monitor capture file
| > | > | > | > netdiag - Network Availability Test / diagnostics
| > | > | > | > netdom -
| > | > | > | > netset
| > | > | > | > nltest - MicrosoftR Logon Server Test Utility
| > | > | > | > pptp ping - pptp diag
| > | > | > | > rasdiag - remote access diag
| > | > | > | > rsdiag - remote storage diag
| > | > | > | > showaccs - show access
| > | > | > | > snmputil
| > | > | > | > snmputilg
| > | > | > | > whoami
| > | > | > | >
| > | > | > | > I left out a few, so...
| > | > | > | >
| > | > | > | > --
| > | > | > | > MEB
http://peoplescounsel.orgfree.com
| > | > | > | ---------
| > | > | > | I meant tracing route to ISP and resolve addresses to host
| > names,
| > | > i.e.
| > | > | > | determine the route to a destination and print out the list of
| > the
| > | > | > | intermediate routers. I need see what intermediate routeres
are
| > | > between
| > | > | > my
| > | > | > | pc and ISP. So I need use TRACERT command line utility. What
IP
| > need
| > | > be
| > | > | > | specified for tracert parameter, IP address or default gateway
| > | > address?
| > | > | > (i
| > | > | > | can see it from winipcfg)
| > | > | > |
| > | > | > | tracert IP
| > | > | > |
| > | > | > | thanks
| > | > | -----------
| > | > |
| > | > | I just need to know whether I directly connected to my ISP router,
| > or
| > | data
| > | > | may be transferred through some intermediate (nonlegitimate)
router
| > | which
| > | > | work as packet sniffer to intercept data for third-party person.
| > | > |
| > | > | S.
| > | > |
| > | >
| > | > AH, okay. You may have an ISP which is offered as other names in
| > | different
| > | > regions, or which sub-serves via other networks [leased access].
| > You're
| > | > interested in the hops and the returns [which should match]. Once
you
| > get
| > | > your names {or addresses if that is what's found}, do a whois if
| > necessary
| > | > and other tracing. Ping is useful as well.
| > | > Almost all ISPs have "lurkers" [registered users and hackers] doing
| > | router,
| > | > adapter, network, and firewall probes, so make sure all are set
| > properly.
| > | If
| > | > on a phone line your firewall is crucial [it is for other connection
| > | methods
| > | > as well], and MUST be properly setup.
| > | >
| > | > IF you have wireless, be aware there are numerous hack/sniff tools
| > that
| > | may
| > | > be used against that specific segment of your net.
| > | >
| > | > --
| > | > MEB
http://peoplescounsel.orgfree.com
| > | > --
| > | > _________
| > |
| > | Thanks for the helpful info. If someone got my cable modem MAC number,
| > how
| > | this number can be used to identify my computer in a network?
| > |
| > | S.
| > |
| >
| > THAT would and does take a full understanding of packet creation,
transmit
| > headers, and other aspects too lengthy for this forum. However, there
are
| > a
| > number of web sites that have explained the TCP/IP protocol and how
| > networks
| > [the Internet is a network] use it, in depth.
| > The short is, MAC is used in conjunction with IP to form and direct the
| > packet/addressing, MAC CAN be used to identify specific adapters.
| > This is one way DSL, SAT, and cable providers identify their clients.
This
| > is also basically how cell phones are identified, GPS systems locate
you,
| > and other related things work, by identifying the actual specific
device.
| >
| > --
| > MEB
http://peoplescounsel.orgfree.com
| -----------------------------------
| MAC can be used only to identify specific adapters, i.e. whether this
modem
| is online(switched on) or not? If provider, for whatever reason, want
| identify the computer where the message or email was sent from, they need
| know IP address, not MAC? If user is behind online anonymous proxy
server,
| there is no way to detect the computer where the message was sent from,
even
| if they know modem MAC address?
|
| S.
|
Short answer: you're wrong in your assumptions. Please check for packet
formation and other readily available information on the Internet. See also
how hackers attack servers and systems. MOST of the *old information* should
be considered as *historic reference* in value.
$Hundreds of billions were invested worldwide [software and hardware]
specifically to address tracking of illicit and illegal activities. Added
with new Laws erected in every U.N. and W.T.O. charter member nation,
anonymity and privacy is non-existent regardless of the technique used
[unless of course you happen to be some massive world corporation with a
massive legal staff].
Check [V-chip, S-chip, PID, UPnP, and the like] discussions/tech reviews;
look at DRM, Carnivore and D.I.R.T; and other documentation related to this
activity world wide [see such things as US government's demand for access to
ALL user data bases and compliance by almost all providers {health,
telecomm, cable, SAT, GPS, etc.; see same in England, Germany, and
elsewhere}] and think carefully about the ATX *always on/ready* computer.
SOME nations are more protective of their *citizens*, most are quite willing
to partake in the commercial enrichment that compliance provides.
Non-compliance [nation or business] brings economic impact and trade
restrictions.
Also consider: electronic equipment is REQUIRED to emit electronic signals
per standards, in conjunction with the new "military" satellites. All
*sensitive* computer and communication installations are housed in
Electro-emissive secured environments, and on closed networks [check the
number of attacks that some government installation receives, like the
Pentagon : also check the number of purported secure transmission protocols
that have been hacked, such as VPN and SSL, WEP, etc..]..Of course, those
who THINK they have nothing to hide or who believe they are hidden, either
don't know or think about these things, or don't care. This is all
verifiable via various U.N., W.T.O., government, news services, and other
records.
So if anyone still presents that P2P sharing is secured though anonymity,
or via anonymous servers, ignore them, their advise is not based upon the
present state of the world nor the technologies presently being used. Then
again, this is just my considered thoughts on these issues.
http://peoplescounsel.orgfree.com/ref/gen/security/sniffing.htm
http://peoplescounsel.orgfree.com/ref/carnivore.htm
http://peoplescounsel.orgfree.com/dirt.htm
One of your suggestions partially protects you, and that is turning
off/unplugging the modem or other network connection device. But that's only
partial. You can't ignore the other technologies available and being used,
that's like sticking your head in the sand thinking you're invisible.
--
MEB
http://peoplescounsel.orgfree.com
--
_________