How to catch a cyber attacker ?

1 Answer

Answer :

By tapping the IP address of the cyber attacker , extracting the area code , finding out which network it is, their location is caught.

Related questions

Description : What might the outcome of the University of California, Merced, assault been if the attacker had had access to a gun rather than a knife? [Link]?

Last Answer : answer:A person could say that this outcome was a triumph of gun control; there would be several dead people if a gun had been used, but instead we have four living people with knife wounds. So if ... it and construe it in some self-serving justification. Facts don't matter, if you're a gun nut,

Description : What if I killed an attacker in self-defense?

Last Answer : Good for you! Better to kill them and not have to face them in court or provide recovery therapy.

Description : Are Judo techniques still effective on an attacker that doesn't wear a shirt?

Last Answer : answer:Yes, it turns into more of a wrestling match. Take a look at this athlete. https://www.youtube.com/watch?v=pZn8YQxEg2k

Description : Does it make sense to you that many schools have a policy where, if a child is attacked by another child, they cannot defend themself or else they are considered just as guilty as the attacker?

Last Answer : I would immediately remove my children from such a school. They would NEVER go back.

Last Answer : Chest Pain : Heart Attack The first, Chief Symptoms Is Chest Pain. Usually Chest In the middle From Extreme Stress Pain Felt Is. Gently Gently That Pain In the jaw Or Left Shoulder, In the arm Spread ... Any Because Neglect Do No. Above Any A Because See To give With With Physician Advice Take it.

Description : An attacker can create an _____attack by sending hundreds or thousands of email with very large attachments a) Connection Attacks b) Auto responder attacks c) Attachment Overloading Attacks d) All of the above

Last Answer : c) Attachment Overloading Attacks

Description : The digital evidences are used to establish a credible link between a) Attacker and victim and the crime scene b) Attacker and the crime scene c) Victim and the crime scene d) Attacker and Information

Last Answer : a) Attacker and victim and the crime scene

Description : An attacker can create an …………………………….. attack by sending hundreds or thousands of emails with very large attachment A)Attachment Overloading Attack B)Connection Attack C)Auto Responder Attack D)All of the Above

Last Answer : A)Attachment Overloading Attack

Description : The Digital evidence are used to established a credible link between………. A)Attacker and victim and the crime scene B)Attacker And information C)Either A or B D)Both A and B

Last Answer : A)Attacker and victim and the crime scene

Description : In Computer intrusions the attacker will be leave multiple traces of there presence in: A)File System B)Registry C)System Logs D)All of the Above

Last Answer : D)All of the Above

Description : The digital evidence are used to establish a credible link between…… a. Attacker and victim and the crime scene b. Attacker and the crime scene c. Victim and the crime scene d. Attacker and information

Last Answer : a. Attacker and victim and the crime scene

Description : Which attack allows the attacker to execute the scripts on the victim’s browser? a. SSL attack b. Cookie attack c. Banner grabbing d. XSS attack

Last Answer : d. XSS attack

Description : The digital evidence is used to establish the credible link between … a. System, evidence and victim b. Attacker, victim, and crime scene c. Attacker, victim and case file d. Attacker, system and victim

Last Answer : b. Attacker, victim, and crime scene

Description : The digital avoidance are use to stablish a credible link between (a) Attacker and victim and crime scene (b) Attacker and the crime scene (c) Victim and crime scene (d) Attacker and information.

Last Answer : (c) Victim and crime scene

Description : An attacker can create an________attack by sending hundreds or thousands of e-mails a with very large attachments. A. Connection Attack B. Auto responder Attack C. Attachment Overloading Attack D. All the above

Last Answer : B. Auto responder Attack

Description : An attacker can create an …………………………….. attack by sending hundreds or thousands of emails with very large attachment A)Attachment Overloading Attack B)Connection Attack C)Auto Responder Attack D)All of the Above

Last Answer : A)Attachment Overloading Attack

Description : The Digital evidence are used to established a credible link between………. A)Attacker and victim and the crime scene B)Attacker And information C)Either A or B D)Both A and B

Last Answer : A)Attacker and victim and the crime scene

Description : In Computer intrusions the attacker will be leave multiple traces of there presence in: A)File System B)Registry C)System Logs D)All of the Above

Last Answer : D)All of the Above

Description : An attacker sits between customer and Banker, and captures the information from the customer and retransmits to the banker by altering the information. This attack is called as .............. (A) Masquerade Attack (B) Replay Attack (C) Passive Attack (D) Denial of Service Attack

Last Answer : (B) Replay Attack

Description : An attacker sits between the sender and receiver and captures the information and retransmits to the receiver after some time without altering the information. This attack is called as .............. (A) Denial of service attack (B) Masquarade attack (C) Simple attack (D) Complex attack

Last Answer : (A) Denial of service attack 

Description : What exactly is wrong with the Cyber Ninja effort in Arizona?

Last Answer : It is a company run by a pro-drumpf, qAnon conspiracy theorist, a company with zero experience with elections or ballot counting, who tried to keep the methods they are using a trade secret , and ... there to tamper with the ballots, and any result they come up with, should be discarded as fake.

Description : Can you work in cyber-security with a felony for marijuana?

Last Answer : Don’t think they’ll hie you, with any kind of felony conviction.

Description : What are your thoughts on military retaliation, for cyber attacks?

Last Answer : Better to fight fire with fire: knock out Pyongyang’s limited network. Hack Putin’s infrastructure. Steal infiltrator’s bitcoins.

Description : Is it possible that Electronic Warfare or Cyber warfare is being used to sabotage North Korean missile launches?

Last Answer : Better than possible. I would think that it is beyond probable.

Description : Masters in Cyber security and digital forensics vs security certifications like CISSP,OHCP?

Last Answer : answer:

Description : The Stock Exchange, United Airlines and The Wall Street Journal experience computer glitches almost simultaneously 7-8-15. Is the US experiencing a cyber assault?

Last Answer : Nope. Simultaneity is not correlation and is not causation or connectedness. And the stock market was open all day yesterday, it was one exchange out of dozens that was offline.

Description : How does one go on a cyber date?

Last Answer : I don’t know. But I can’t wait to hear about it. Not because I identify with it personally, but because I anticipate a level of weirdness that is compelling. Sort of like one of those situations where you hate to watch something on TV, but you can not stop watching it. What is that called?

Description : Can a cyber attack program (like Stuxnet) be turned around, 'decoded' or something and used against other targets?

Last Answer : My understanding is that stuxnet contained code for a programmable logic controller (PLC) that's part of the target hardware that regulates the uranium centrifuges. This would be very device-specific & not ... purpose. Not that reverse-engineering the worm/virus didn't give them ideas of their own

Description : Is this an appropriate defense for cyber bullying/stalking?

Last Answer : What am I doing correct and what am I doing wrong?

Description : Cyber-disinhibition - Do (young) people who flame repeatedly tend to become friendless in real life too?

Last Answer : from personal experience i am actually angrier with people face to face than on the Internet. There is no point getting that angry on the Internet, because the physical attack that often ... life confrontation isn't possible, so there is no satisfactory or natural conclusion, merely frustration.

Description : Would cyber stalking bother you if it doesn't go beyond watching?

Last Answer : answer:The way you describe it, it sounds awfully like the government. I’m not fond of their intrusion in my life, but I don’t think I can do much about it. But sometimes my friend and I will make jokes on the phone, just to mess with them, in case anyone happens to be listening to that call.

Description : Will I get cheaper & better laptop deals on Black Friday or Cyber Monday online?

Last Answer : Six of one, half-dozen of the other. It really depends much more on exactly what laptop you’re looking to get.

Description : Cyber schools for developing countries realistic?

Last Answer : Money can make anything happen, the question is just where it’s going to come from. And then another question would be if the education actually worked lol. Some education is better than none though.

Description : Does Facebook or any other website for that matter,follow through on Cyber-bulling/Harassment complaints?

Last Answer : I think that they respond within their power. Blocking the users who are committing the infraction, for example.

Description : Have you ever committed "cyber-suicide"?

Last Answer : When I get bored, I leave the site for a while, but I might as well have committed cyber- suicide, because I forgot my password, and the help answer.

Description : How To Stop Cyber Harassment & Cyber Bullying?

Last Answer : I recently committed internet suicide. Had to - my screen name (that I used literally for ten years) was so original that anything that popped up on Google when you searched my name, was me. Because of ... phone number. Yes, those people still know where I live, but that's where my dogs come in.

Description : Do you take advantage of Cyber Monday?

Last Answer : I have yet to come across a deal that really seemed that good to me. Same thing with Black Friday sales. I can usually find better deals when I’m not looking for them.

Description : Raise your (cyber) hand if you hate snow!

Last Answer : Nope! It’s coming down in big lofty flakes right now, and I love it!

Description : Today is Cyber Monday. So, where are the great online deals?

Last Answer : i heard that cyber monday was the worst day to shop around online more computer frauds then ever.. idk

Description : Why can't cyber bullies be prosecuted for slander or libel?

Last Answer : answer:The cases are very different things-yelling fire in a crowded theater (when there isn't one) would serve to cause panic, and is generally illegal under something like inciting a riot or ... 's my un-informed opinion). Read up on defamation, here: http://en.wikipedia.org/wiki/Defamation

Description : Sony Cyber-shot?

Last Answer : answer:It may be because 1) you are either closer to the subject than the lens’s focal length or 2) the closer that you are, the more prone the picture is to the movement of your hand. Try and take a picture using the timer function. See if that makes a difference.

Description : Name the primary law in India dealing with cyber crime and electronic commerce. -Technology

Last Answer : The primary law is Information Technology Act 2000.

Description : i. select city from training where topic = 'Cyber Security'; -Technology

Last Answer : i. New DelhiFaridabadGurugramii. 2iii. 11000iv. Ms. Neena

Description : What is a computer cyber crime?

Last Answer : Cyber crimes are crimes that are perpetrated with the use of a computer. An example might be where someone uses a pc to illegally obtain someone else's personal information and then the "bad ... information to steal money from the victim. Simply, cyber crime is crime committed using a computer.

Description : What is the function of Cyber 71 ?

Last Answer : Cyber ​​71's job is to protect Bangladesh from all kinds of crimes in the net world.

Description : Who is the founder of Cyber ​​Bangla ?

Last Answer : Founder of Cyber ​​Bangla - Tanjim Al Fahim facebook account - Fahim Rahman facebook page - https://www.facebook.com/TanjimOfficial/

Description : What is needed to build a 'cyber cafe' ?

Last Answer : Anyone can build a cyber cafe if they want. You have to choose the place first. It doesn't matter if the entrepreneur has his / her own home mainly in the vicinity of training ... , etc. Browser connection. Various banks and financial institutions have started giving loans to build cyber cafes.

Description : What is Cyber ​​Cafe ?

Last Answer : Anyone can wander around the world of internet for as long as he wants for money , as well as tea, coffee , light snacks, long internet chats , e-mails, that is the place where cyber cafe is. In many cases it is also called cyber kiosk.

Description : What is Cyber Crime ?

Last Answer : According to the encyclopedia, "cyber crime" refers to the crime that is committed using the Internet . It is related to computers and computer networks.

Last Answer : Cyber crime is a computer related crime.