logo elektroda
logo elektroda
X
logo elektroda

Title: Stalker Tracking via Facebook: How to Check Suspicious IP Address & Protect Privacy

koszelka 68175 15
ADVERTISEMENT
Treść została przetłumaczona polish » english Zobacz oryginalną wersję tematu
  • #1 17121734
    koszelka
    Level 9  
    Hello, I'm not writing in the right place, but I really need help and I do not know where to report (ultimately to the police) I have a problem: from what 3 years old stalker gnebi, a long story but the main problem were deaf phones at work and at home. A month ago I changed my job (about which I wrote to a few people on Facebook) and in this new again deaf phones started. And the calls to the house increased. I suspect that this person is breaking into my account on fb and reading my messages. Recently I noticed a new login and an IP address was given. My question: can you check it? The website pops up the message that the address is too long, namely: 2a00: f41: 1cd0: 128f: 8ca8: dd74: ea5: db75. Is it possible to check it out, do not want to get into paranoia, but I can not sleep at night anymore. I also know that this man has a policeman friend, can he track my account? I would also not like to delete my account on fb, unless, as a last resort. Please help.
  • ADVERTISEMENT
  • #2 17121782
    winiar2014
    Level 10  
    I recommend VPN No one pushes in, now you can ask UKE to check who spreads IP, if the ISP client has to provide the person's details, because he violated the privacy rules, simply saying, he borrowed the video tables and cameras he has recorded, he is making you problems and this is punished.

    I will add to dispel any doubts if it will be like our beloved Neostrada has a dynamic IP, but .... have address pools and LOGI just need to check and after the topic


    greetings


    winiar777
  • ADVERTISEMENT
  • #3 17121788
    RebellionArts
    Level 23  
    A bit like this is not exactly how a colleague winiar2014 writes there or winiar777.
    VPN as a virtual network protects you, exactly your computer's IP number before identifying what data you view and download, you connect to sites by a substituted IP address. It will not give much to the current situation. Techniques for hacking on Fb are different: phishing, sniffing, or brute force. If they are already hacking, change the password to Fb, then to OTHERS to the e-mail which is connected to the Fb account. It will give you privacy, but if you do not take care of it, the situation will happen again. Phishin is a type of attack consisting in sending fake e-mails and an offer that will interest you to the extent that you open the file attached to it, eg pdf, it opens the backdoor for another computer with full access. Sniffing is a kind of eavesdropping of data that you send to the router, you can take over your data from this level of hacking, you can avoid this by applying the principle of self-discipline, i.e. I WILL NOT WANT ON THE SITE WITH ENCRYPTED BASIC (eg: HTTP, POP3, IMAP, FTP). Brute force hmmmm, this is a quick method to crack the password with a dictionary. Knowing your e-mail, you can crack a password to it, a simple program for generating passwords and entering them into the loading field: password. If you have a password: stasio11 then you have 8 hours of privacy (for 8 characters it falls out). You must use the new STRONG password with 20 characters (exaggerated). My router password is 18 characters long (roottruewy3malosci). The more characters there are, the more computing for the computer, a good example here is mathematics: the engine. Breaking such a password is a puzzle of all characters in all possible places, how to give a 5-character password, we have 1x2x3x4x5 = 120 different combinations - 5 minutes for a computer (I omit that all numbers of alphabets and numbers from 0-9 are in place of each character) and special characters), but for stasio11 it's 40320 combinations, and give a password of 20 characters (2432902008176640000 combinations *). If they have your phone number, they call you at work and take into account that you wrote a few people on Fb (that is, you suspect them) write them all that you changed your job to some other, how your phones will break you, you have a range of suspects. You can also go to the police, on troublesome phones, check the billing and place of calling and the identity of the person (owner of the sim card). This description is superficial and I turn to the whole post, there are many other methods, I described those that can be done in home conditions and for a fan, and there are more surveillance methods that approach much more serious matters such as ordering blackmail.
    If you have any more serious questions, write to me privately.
    greetings
  • #4 17121869
    KOCUREK1970
    Network and Internet specialist
    winiar2014 wrote:
    now you can report to UKE can check who is spreading such an IP

    What does UKE do?
    He will not check anything and will not receive any such data.
    UKE does not conduct any investigations.
    RebellionArts wrote:
    You can also go to the police, on troublesome phones, check the billing and place of calling and the identity of the person (owner of the sim card).

    Stalking and persistent harassment.
    http://www.infor.pl/prawo/prawo-karne/pokrzywdzony/704421,Stalking-uporczywe-nekanie.html
  • ADVERTISEMENT
  • #5 17121938
    Anonymous
    Anonymous  
  • #6 17122207
    gasak
    Level 19  
    RebellionArts wrote:
    how do you give a 5-character password then we have 1x2x3x4x5 = 120 different combinations


    Is there a friend sure that's how it matters? For me only 100,000 combinations come out for the numbers 0-9 alone, and where do the letters and special characters come from?

    RebellionArts wrote:
    for stasio11 there are 40320 combinations


    Here, similarly ...
  • #7 17122337
    RebellionArts
    Level 23  
    gasak wrote:
    RebellionArts wrote:
    how do you give a 5-character password then we have 1x2x3x4x5 = 120 different combinations


    Is there a friend sure that's how it matters? For me only 100,000 combinations come out for the numbers 0-9 alone, and where do the letters and special characters come from?

    RebellionArts wrote:
    for stasio11 there are 40320 combinations


    Here, similarly ...


    Dude, read my post again and delete your unnecessary ... (10 line *)

    I see that specialists in connecting graphics cards are speaking here ...
    Prosecutors Office? :) :) :) I worked, for some time at the prosecutor's office, people have 20 million (department, real estate) fraud or murder protocols there, it's punishable, it does not mean that they deal with it as another priority matter. For a month, they will find out that someone is calling, and that someone connects to the author (who is, for example in Warsaw) via the Internet from Silesia, Poznan or Albania. After two years they will not collect any more evidence, the matter will be allowed ..., it is not worth sacrificing time if there is no hard evidence and the IP and telephone number are pictures of the thief's boot in those times.
    "(...) someone calls me and broke me on the faccebook Pany policemen"
    And what are they supposed to track, IP number?
    Phone number?
    Read, but I do not know if you will find something on this truncated Internet with Chrome (xD) what are Socks, backdoor of botnet comps.
  • #8 17122503
    Anonymous
    Anonymous  
  • #9 17122549
    RebellionArts
    Level 23  
    There is a way that you can perform by catching its true IP and the functions of the aggressor computer. Think about it, especially with the police, your unlicensed programs, etc. You can laugh now but not everyone in this country feels safe in the police environment. If you want to catch a guest, write and if you want to push him away, just go to the police and put in a hard password.
  • ADVERTISEMENT
  • #10 17122785
    KOCUREK1970
    Network and Internet specialist
    Christophorus wrote:
    In my opinion, it is only the prosecutor's office or the police.

    If there is a policeman somewhere in the perpetrator, it is only the prosecutor's office.
    RebellionArts wrote:
    Prosecutors Office? I worked, for some time at the prosecutor's office, people have there protocols from frauds for 20 million (department, real estate) or murders, the fact that it is punishable does not mean that they deal with this as another priority matter

    Whether this is justified or not the PROCURATOR will assess - and he will take it seriously, because it is a PERSONAL attack on a particular person.

    Notices to the prosecutor's office can be submitted by anyone in all circumstances.
    We even have an obligation to report a crime if we know something about it.

    Stalking is prosecuted at the request of the victim, and so it should be included in the documents submitted to the prosecutor's office.
  • #11 17122844
    Anonymous
    Anonymous  
  • #12 17122889
    RebellionArts
    Level 23  
    That's why I wrote that only the police if you want to scare and to catch it you have to use other means, moreover ... ech. What are the comments of my posts if you do not understand them? Posts are for the author, How do you want to know Chrostophours how to do so 'stalker''i so went out on the criminal and the injured person gained some evidence thanks to criminals you also better write to me, and nonsense print and spam do not make sense any more. If someone here is given, he / she has something specific to write and is aware that every unofficial way of determining the aggressor's identity is FLAMBED if it is publicly available here.
  • #13 17122899
    seb235
    Level 28  
    @koszelka Start with the basics:
    a) change passwords to all online portals that you use, just remember that this password was not a password word for example "Password12g!"
    b) enable two-step verification, then after entering the correct password you must enter the code received by SMS and this makes access much more difficult.
    c) it's best not to use your accounts on public computers, if you already do (you have to) make sure that your computer does not remember passwords and it's best to do it in private browsing mode.
    d) all social networks have privacy settings - secure as much as possible.
    e) check the list of contacts - maybe you added someone you do not know? maybe a friend's account from a decade ago is not his account anymore and someone else is playing with it?

    Look at the computer at home, do you use it yourself? did not you run any news on it from a friend?
    Do you have WIFI? If so, change the password.

    What you write now may sound strange but - you entered your phone number in google? Maybe someone deliberately or by mistake typed your number to some advertisement on the internet or in a profile on a dating site.
    Have you contacted your telephone operator? Maybe you are in some foreign base and the computer calls your number by terminating the call counting that you call back, I had it myself and the problem was solved in a few minutes by blocking calls from abroad to my number.

    And the last thing, think about whether you did something (deliberately or not) some harm? Did not these three years ago change anything that changed your life, or maybe someone else?

    Remember that if this person has all the data about you and it is practically on the spot, he probably has it directly from you.
  • #14 17122978
    gasak
    Level 19  
    RebellionArts wrote:
    Dude, read my post again and delete your unnecessary ... (10 line *)

    Ad.1 I did not "collate" and you do not "dude"
    Ad.2 Silnia! it's not a formula for calculating the number of combinations without repetition ... And if your friend from the forum insists, please ask your method to calculate the number of combinations of "six" in the lotto.
    And if I'm wrong, apparently I was learning a different "lower" mathematics.

    Forgive digression but it turned inside me ...
  • #15 17123012
    RebellionArts
    Level 23  
    If I were to describe the whole process that occurs during a brute force attack, they would report me that they were spam and that they were not on the subject.
    I described superficially, they also cling to ...
    Now it turned me off. As someone who is interested in security audits, I have a designated action process, usually logical. In this case, before I wrote anything, I considered this topic serious and checked what posts the new author of the topic added, I learned thanks to the fact that he does not have much idea about computers. So I tried to describe as far as the advantage of the imagination, it is not bad but unfinished, in such a way that the author understands how the level increases with the next sign. I do not know what you want to do, but I guess. I have been tutoring students of electrical engineering and I know how people think what they use as a basis to use exhaustive vocabulary (read definitions), it's a pity that also in the company of people who do not have too much idea about it. This is the electrode's policy, unfortunately if you do not understand it, use the search option or go to five-year studies related to your topic because you lower the forum level (xD what ??). So if you want to help someone, then you must also be able to translate, "What do you want? Gasak?", Create a new topic, then I will write the elaborate.
    Or give me your e-mail, I will make it available in your (user) person here, the so-called TuT from password generators and brute force password cracking methods. (I will add something about the CUDA power for e-mail).
    I greet all the guys
  • #16 17123216
    jimasek
    VIP Meritorious for electroda.pl
    @koszelka if he wants to take the floor, I invite you to the WUT, I will refit the subject because, for now, he is throwing mud and nothing more.

Topic summary

The discussion revolves around a user experiencing stalking via Facebook, suspecting unauthorized access to their account, and receiving harassing calls. Participants suggest various measures for protection, including using a VPN to mask IP addresses, changing passwords, enabling two-step verification, and securing social media privacy settings. They emphasize the importance of documenting harassment incidents and reporting them to law enforcement, particularly the prosecutor's office, as stalking is a criminal offense. Concerns are raised about the effectiveness of police investigations and the potential risks of gathering evidence independently. The conversation highlights the need for vigilance in online security practices and the complexities of dealing with stalking cases.
Summary generated by the language model.
ADVERTISEMENT