is aIP address blocking
configuration of a network
service that blocks requests from
hosts with certain IP addresses.
IP address blocking is commonly
used to protect against
brute
force attacks and to prevent
access by a disruptive address.
IP address blocking can be used
to restrict access to or from a
particular geographic area, for
example, the syndication of
content to a specific region
through the use of
Internet
[1]geolocation and blocking.
How it works
Every device connected to the
Internet is assigned a unique
IP
address, which is needed to
enable devices to communicate
with each other. With appropriate
software on the host website,
the IP address of visitors to the
site can be logged and can also
be used to determine the visitor's
[2][3]geographical location.
Logging the IP address can, for
example, monitor if a person has
visited the site before, for
example to vote more than once,
as well as to monitor their
viewing pattern, how long since
they performed any activity on
the site (and set a time out limit),
besides other things.
Knowing the visitor's geo-location
indicates, besides other things,
the visitor's country. In some
cases requests from or responses
to a certain country would be
blocked entirely.
Geo-blocking has
been used, for example, to block
shows in certain countries. Such
as
censorship of shows deemed
inappropriate especially frequent
[4][5]in places such as China.
Internet users may circumvent
geo-blocking and censorship and
protect personal identity and
location to stay anonymous on
the internet using a
VPN
[4]connection.
On a website, an IP address block
can prevent a disruptive address
from access, though a warning
and/or account block may be
used first. Dynamic allocation of
IP addresses by
ISPs can
complicate incoming IP address
blocking, rendering it difficult to
block a specific user without
blocking many IP addresses
(blocks of IP address ranges),
thereby creating collateral
[6]damage.
Implementations
Unix-like operating systems
commonly implement IP address
blocking using a
TCP wrapper,
configured by host access control
files /etc/hosts.deny and /etc/
hosts.allow.
Both companies and schools
offering remote user access use
Linux programs such as
DenyHosts or Fail2ban for
protection from unauthorised
access while allowing permitted
remote access. This is also useful
for allowing remote access to
computers. It is also used for
Internet censorship.
IP address blocking is possible on
many systems using a
hosts file,
which is a simple text file
containing hostnames and IP
addresses. Hosts files are used
by many operating systems,
including Microsoft Windows,
Linux, Android, and OS X.
Circumvention
(0) Comments here
Sir No Comment on this post Please Make a New