Skip to main content

How to track a person on the net? (Part II)

 


How to track a person on the net? (Part II)

The power of the Internet is extremely high. Many of the modern remote-control systems work over the ethernet. That makes fast and properly working internet one of the vital tools when we are thinking about sharing the information but also when some systems like engines are adjusted by using the remote control. 

The search engines have stored very much data, which is not indexed. That means that there are card files for that data, but the page rank of those files is so low, that they are not seen in the public eye. And somebody asks sometimes, do those data storages follow the CIA (Confidentiality, Integrity, and Availability) standard? If that data can be changed or otherwise manipulated that thing can cause harm for many actors. 

So what makes this data interesting? The thing is connected to the thing, which is called "Carrier IQ". When some user uses the net search, the data is stored in the indexing system. Also, the homepage that the user has been click is stored in the indexing system. This thing is rising its page rank and the place where it is visible in the search results. But when the homepage is coming to the screen, the data travels on the net. And in front of each data packet is the identifier called Carrier IQ. 

The purpose of this small code the routers route the data to the right place. That place is the IP-address of the network card. And the risk is that when the data is transmitted by using the TCP/IP protocol, the computer sends the feedback where is the size of the data package and the check number, what tell the sender server that the data is reaching the receiver. So the answer is that "IP XXX.XXX.XXX.XXX" has been received the data. 

The thing is that the IP-address is telling the network what the computer uses. And then the system can ask, who is the customer, who uses that IP-address? But how Carrier IQ is connecting with this kind of thing? The homepages could contain the data, what is prohibited to share, and the server what runs those homepages would send the data about visiting those homepages to the third party. When some server sends the data to the internet, that feels innocent. The IP-address of the server can be used to track the users of the web services that server hosts. 

The answer or echo that is coming from the internet is telling that the system. What has certain IP has received the data. So the tracking computer can send the orders to the network, what the target uses to start the track the device. And that thing would uncover the location of the user of the network by millimeter accuracy. 

Comments

Popular posts from this blog

Plasmonic waves can make new waves in quantum technology.

"LSU researchers have made a significant discovery related to the fundamental properties and behavior of plasmonic waves, which can lead ot the development of more sensitive and robust quantum technologies. Credit: LSU" (ScitechDaily, Plasmonics Breakthrough Unleashes New Era of Quantum Technologies) Plasmonic waves in the quantum gas are the next-generation tools. The plasmonic wave is quite similar to radio waves. Or, rather say it, a combination of acoustic waves and electromagnetic waves. Quantum gas is an atom group. In those atom groups, temperature and pressure are extremely low.  The distance of atoms is long. And when an electromagnetic system can pump energy to those atoms. But the thing in quantum gas is that the atoms also make physical movements like soundwaves. It's possible. To create quantum gas using monoatomic ions like ionized noble gas. In those systems, positive (or negative) atoms push each other away.  When the box is filled with quantum gas and som...

What is the difference between TR-3A and TR-3B? And are those planes real?

What is the difference between TR-3A and TR-3B? And are those planes real? Is TR-3B (0) "Black Triangle UFO" or is it only the piece of paper?  The study project, what is used to create advanced ideas for use of the nuclear-powered aircraft. Or is it the study project or black budget aircraft, where lost 2,3 trillion dollars (1)of the stealth bomber were gone. In this text is things, that might seem very difficult to accept, and when we are thinking about things like doubling the object or making it smaller by using huge layers of energy, nothing denies to test those things. But were those tests successful, there is no data about that in public Internet, so we must say that things like doubling the human or aircraft can be tested, but the results can be unknown.  But in the source two is the tale, what seems like impossible, those men, who got Noble Prize put at first time one atom to the box, and hit it with photon one photon in the box and hit it with t...

The interesting coincidence between USS Sea Shadow (1982) and CSS Virginia (1862)

Image I The interesting coincidence between  USS Sea Shadow (1982) and CSS Virginia (1862) Far away from its time is the thing, that you might notice when you see those two images. The upper one (Image I) is portraying the modern naval USS Sea Shadow (IX-529)(1) experimental Stealth ship, which was created by Lockheed-Martin, and the image below (Image II) is portraying the CSS Virginia (2), the ironclad from the Civil War Era. The thing why the hull of the CSS Virginia, what is ironclad from 1862 is that the ammunition of the cannons would not transfer their impact energy to the hull of the ship. And the reason why Sea Shadows hull has this form is that it should point the radar echo away from the hull.  The thing that I must say that CSS Virginia is far ahead its time because that structure is effective against the explosive ammunition, and the slanting armor of tanks like T-34 and Sherman have made them effective. But for some reason, the use of slanting ...