Thursday, September 22, 2011

Task 3 and 4 of Lab 2.2.5

Task 3
The purpose of trace route programs is to show the reader more about how the network works. It shows how a packet travels along the network and the path it takes to get to the destination. Another purpose of trace route programs is to help a sender or source trace the path a packet that has been sent throughout the network. The IP packets may travel on different paths because of the complexity of the network even though most IP packets take one path and one path only. Traceroute programs are programs that can be used by actual humans and machines for the sole purpose of retrieving information. The program can also be used to help test your connectivity to the network.
Task 4
Traceroute programs are very similar to Ping programs. Ping programs are often used by hackers in order to infiltrate a computer system. That is one of the few challenges and problems with having a program like Traceroute. Once a person has the IP address of the computer they want to hack, the rest is pretty simple for the best hackers. In addition to that, since Traceroute programs give more than just the IP including location, creator, and exact latitude and longitude, it makes life simple for hackers. Traceroutes program provide access to essential and integral information for hackers that they can use to hack computers of not only regular individuals but even bigger corporations. There are other security issues that could arise from using programs like NeoTrace, Ping, and Traceroute programs but the major one is the possibility of hackers having access to the most important information about a network or website.

No comments:

Post a Comment