[HTML9] Top Menu


[HTML5] Ads(SP-UP-LNK-728x15)

Tracing of computer through Internet

Alert your system can be scanned when it connect to internet without your permission.
Think somebody telling you some important facts about your pc, without seeing it. Like: Type of OS, hard ware configuration, list of the users using it with their password and more things. You will be surprised, that how he knows? These are very important and valuable data which can be used by hackers for hacking your computer.
There are some third party servers which are used to store all this data collected from all over the internet. You may not know when and how your computer is scanned and valuable data about your system has passed to that server.

Q:    How it happens?
Ans:   A tracking code is installed in web page of a site which is not visible to its viewer. When this page of site is accessed and gets opened in browser of any system its tracking code become active and starts collecting system important parameters and user data. After collection it sent to external third party server where it being stored for further study.
This active code can extract information from OS, Browser and Network Connection of a system.

Q:   Which type of data that can be extracted from system without user’s knowledge?
Ans:   Many critical parameters of system can be extracted and transmitted through network without the knowledge of user, like:

1.  On Computer System
Information taken through OS
  1. Type of OS with their version and updates
    • Window
    • Linux
    • Mac ect.
  2. Language of system OS
  3. IP address of system on network
  4. MAC address of network card
  5. Time duration for which system is on – session time
  6. Type of application software installed in system
  7. Type of antivirus
  8. Name and number of users
  9. System capability, i,e. Processor speed, RAM etc.
Information taken through Browser
  1. Type of browser – like
    • IE explorer
    • Firefox
    • Chrome
    • opera
  2. Screen colors
    • 32-bit
    • 24-bit
    • 16-bit
    • 4-bit
  3. Screen resolution
    • 800 x 600
    • 1024 x 768
    • 1280 x 1024
    • 1440 x 900
  4. Flash version
  5. Java support
Information taken through Network Property
  1. Service provider
  2. Connection speed
  3. Connection type
2.  On Mobile Device
  1. Mobile OS
  2. IP address
  3. Mobile Carrier Provider
Q:    For why it is done?
Ans:   In positive sense, this is done to make the statistical data about computer system, user interest, type of program used and their popularity etc.
But in negative sense, there are many hackers sitting behind some unauthorised web site and server to trace user’s vulnerable data about Id and Password used on system as well as on different sites.

Q:   Who are behind this?
Ans:   There is no any single standard worldwide body that responsible to take above readings.
Instead it is done by many tracking servers present all over the world through tracking codes engraved in websites. Many hardware and software companies are showing interest to identify its future customers.

You can watch few examples to know practically how it works:
Tracing IP Address
Tracing Screen Resolution
Some related topics:
Hacking Methodology


Post a Comment

Your remarks here!