Computer Science, asked by sidakdeep2016, 1 year ago

what is 127.0.0.1 ping of desktop server that hackers use tell me whatever you know


garywalter1221: simple it is a local host u can do anything here
garywalter1221: it is a local host u can do anything here if u want to know in deep u can search in (Technical Sagar YouTube Channel) here u will get your answe

Answers

Answered by anuragkumar1067
1
127.0.0.1 is the loopback Internet protocol (IP) address also referred to as the “localhost.” The address is used to establish an IP connection to the same machine or computer being used by the end-user. The same convention is defined for computer’s that support IPv6 addressing using the connotation of ::1. Establishing a connection using the address 127.0.0.1 is the most common practice; however, using any IP address in the range of 127.*.*.* will function in the same or similar manner. The loopback construct gives a computer or device capable of networking the capability to validate or establish the IP stack on the machine.

How is 127.0.0.1 Used in the Hosts File?
Whenever a computer user tries to access a website or remote computer by name, the computer checks the locally stored Hosts file for domain name resolution before sending a request to the Domain Name Server (DNS). The 127.0.0.1 IP address is commonly found in the Hosts file on computers assigned to the plain English address, “localhost.” It is also used by computer malware to assign legitimate websites to the localhost to prevent the end-user from seeking legitimate computer security assistance with malware infection. This type of change has most commonly been associated with many of the computer scareware packages that have been deployed across the Internet through maliciously infected websites, Trojan horse viruses, and infected email attachments. Some computer administrators, and interested students, can modify the hosts file to prevent access to undesirable websites; however, is not the preferred method as the end-user (or administrator) now becomes responsible for removing the entry when required. Examples of host file entries:
For More Information:: Visit On
www.tech-faq.com/127.0.0.1
Similar questions