473,408 Members | 2,477 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,408 software developers and data experts.

IP program

8
well hi guys, i have a problem, you see, i'm making a special program in c++, i want to make broadcast IP program to an email so if computer is stolen you can retrieve location via IP, my friend is studying Network so he will do the net trick
but i have a problem, we are going to try to scan IP in batch by opening it via c++ but i have no idea how, so basicly its just, how can i open a program in c++, not read it, but really open it activate it, and what library file do i need? that is all, thanks for reading
Aug 4 '08 #1
17 2004
sicarie
4,677 Expert Mod 4TB
Why not just use the API of the OS to get the IP? That would save you attempting to interface with this program (whose API you'd probably need to learn)...
Aug 4 '08 #2
jusefd
8
because i dont know what API is yet
Aug 4 '08 #3
sicarie
4,677 Expert Mod 4TB
because i dont know what API is yet
And yet you want to use the program's API... You know it, you just don't know that you know it.

Google Search of API .

I believe it will be easier and more useful of your time to use the WIn32 API instead of the program's API, but this choice is ultimately yours.
Aug 4 '08 #4
jusefd
8
And yet you want to use the program's API... You know it, you just don't know that you know it.

you mean like those things that are used to compile games? like direct X?
Aug 4 '08 #5
oler1s
671 Expert 512MB
you mean like those things that are used to compile games? like direct X?
Compile? APIs don't compile anything. Technically, they aren't even compilable (if they are an API to a library, the library may be compilable, but not the API itself).

DirectX is actually a collection of APIs (and some more). If you want to grab the current IP, use the Windows API to do so. With the API, you can query Windows for whatever the current IP is and then work with that information directly in your program.

Using a batch file, which no doubt contains a call to ipconfig, and then reading the output is inefficient and probably not a good idea in something security related like yours.
Aug 4 '08 #6
jusefd
8
hmm so, is it even possible to create such a device?
Aug 4 '08 #7
sicarie
4,677 Expert Mod 4TB
hmm so, is it even possible to create such a device?
By that comment, I can see you didn't even bother clicking through a few of the links that the Google search I posted came back with. Please do some research before blindly posting.

As well, I'd like to take this moment - before you've reached the design stage - to point out that you would really need more than an IP to figure out where your laptop is once it's stolen, as IP usually (and it's possible to get around that as well) only returns a very general location. I'd recommend creating and installing your own program on the system to capture *everything* and upload that to an email address you control. Though you'd have to be very careful with that and make sure all that communication is encrypted so if the email account is compromised they don't have your private information. Or just deleted it on a regular basis... Anyway, that way you'd have any info about that person they entered into your laptop - certainly more to go on than an IP address.
Aug 5 '08 #8
jusefd
8
hmm, well i could put a friendly keylogger on my pc and send it to that email... so his name would be (hopefully) reveiled, but i tought you could trace someone's adress by knowing his IP and his ISP?
Aug 5 '08 #9
Banfa
9,065 Expert Mod 8TB
No a computers IP address only gives its address on the local network.

If that computer is behind a router then it will not help. The routers external IP address will give the routers address on ISPs network but the computer will have an local enternet address which will only give it the address on the network including the computer in router (its internal IP address) and any other computers on the network.

There are lots of things in any network connection what change the address of the destination meaning that knowing the local address of the destination is basically of little or no use.

Try reading up on Network Address Translation (NAT)
Aug 5 '08 #10
JosAH
11,448 Expert 8TB
I was thinking of a simple Kensington lock ...

kind regards,

Jos
Aug 5 '08 #11
sicarie
4,677 Expert Mod 4TB
I was thinking of a simple Kensington lock ...

kind regards,

Jos
Good call there, as well as BIOS Password and HD encryption. Make it so your device is not worth their time to take.

And then don't leave it laying out.
Aug 5 '08 #12
jusefd
8
bios password can be cracked :D and if you ever want to see your laptop again?
PS, give me a metalscissors and ill break thru kensington
Aug 5 '08 #13
sicarie
4,677 Expert Mod 4TB
bios password can be cracked :D and if you ever want to see your laptop again?
PS, give me a metalscissors and ill break thru kensington
And then that's what the HD encryption is for. Sure, all of that can be bypassed, the question is: is it worth it to the person who stole it. Besides, if anyone takes it do you really think you'll ever see it again? (spare parts anyone?)

First thing I would do if I stole one would be to look at the HD using a recovery tool, see if I can find interesting stuff, and then re-image it, which would wipe out your IP program without it ever being triggered.
Aug 5 '08 #14
For laptop security the only way to truly keep it safe is by being careful. If it is stolen, a program to track it is pointless, as anyone who could actually log onto your account is likely to know better ways of getting at your information (such as a live cd or booting off of a usb stick).

Encrypting your hard drive does keep your information safe but does not stop someone from simply re-formatting your hard drive (and poor encryption can be broken).

The only way of truly tracking your laptop would be to get a piece of hardware that goes in it and sends packets over any network which it is connected to. This could take the form of a hardware key-stroke logger or could even have a gps.

Even that has problems, for instance, unless it is built into the base hardware of the computer/designed very carefully because it cannot rely on a driver or it will become inoperable when the OS is re-installed.

Overall, the best method for laptop security is good encryption to protect your information and a watchful eye to keep it from getting stolen in the first place.

Edward
Aug 5 '08 #15
jusefd
8
ok then, :D ill stop making effort to make it
Aug 6 '08 #16
JosAH
11,448 Expert 8TB
PS, give me a metalscissors and ill break thru kensington
Sure, everyone trusts a person sneaking around with metalscissors in an
office environment.

kind regards,

Jos
Aug 6 '08 #17
jusefd
8
^haha, you're right about that, it would just be cool if, you know those chips they put in your laptop that makes it trackable, it would be cool if everyone had a freeware version of that, so thats why we were making it, i know how it feel, someone once stole my very expensive XPS laptop, and so thats why i started this project
Aug 6 '08 #18

Sign in to post your reply or Sign up for a free account.

Similar topics

2
by: Mike | last post by:
I am sure that I am making a simple boneheaded mistake and I would appreciate your help in spotting in. I have just installed apache_2.0.53-win32-x86-no_ssl.exe php-5.0.3-Win32.zip...
22
by: edgrsprj | last post by:
PROPOSED EARTHQUAKE FORECASTING COMPUTER PROGRAM DEVELOPMENT EFFORT Posted July 11, 2005 My main earthquake forecasting Web page is: http://www.freewebz.com/eq-forecasting/Data.html ...
0
by: Tom Lee | last post by:
Hi, I'm new to .NET 2003 compiler. When I tried to compile my program using DEBUG mode, I got the following errors in the C:\Program Files\Microsoft Visual Studio .NET 2003\Vc7 \include\xdebug...
11
by: christopher diggins | last post by:
I am wondering if any can point me to any open-source library with program objects for C++ like there is in Java? I would like to be able to write things like MyProgram1 >> MyProgram2 >>...
1
by: Eric Whittaker | last post by:
hi all, im trying to write my first c++ program. a success, but i can't get the window to stay open after user enters input. it just automatically closes. right now the end of my program looks...
9
by: Hemal | last post by:
Hi All, I need to know the memory required by a c program. Is there any tool/utility which can give me the memory usage in terms of DATA segment, TEXT segment, BSS segment etc. I am working...
7
by: ibtc209 | last post by:
I just started programming in C, and I need some help with this problem. Your program will read the information about one MiniPoker hand, namely the rank and suit of the hand’s first card, and...
2
Banfa
by: Banfa | last post by:
Posted by Banfa The previous tutorial discussed what programming is, what we are trying to achieve, the answer being a list of instructions constituting a valid program. Now we will discuss how...
0
amitpatel66
by: amitpatel66 | last post by:
There is always a requirement that in Oracle Applications, the Concurrent Program need to be execute programatically based on certain conditions/validations: Concurrent programs can be executed...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.