WEFOUNDRouter


A router [a] is a networking device that forwards data packets between computer networks . Routers perform the traffic directing functions on the Internet . A data packet is typically forwarded from one router to another router through the networks that constitute an internetwork until it reaches its destination node . [2]

A router is connected to two or more data lines from different networks. [b] When a data packet comes in on one of the lines, the router reads the network address information in the packet to determine the ultimate destination. Then, using information in its routing table or routing policy , it directs the packet to the next network on its journey.

The most familiar type of routers are home and small office routers that simply forward IP packets between the home computers and the Internet. An example of a router would be the owner's cable or DSL router, which connects to the Internet through an Internet service provider (ISP). More sophisticated routers, such as enterprise routers, connect large business or ISP networks up to the powerful core routers that forward data at high speed along the optical fiber lines of the Internet backbone . Though routers are typically dedicated hardware devices, software-based routers also exist.

Routers, both the big corporate kind and the small one gathering dust in the corner of your home, have long made an attractive target for hackers . They're always on and connected, often full of unpatched security vulnerabilities , and offer a convenient chokepoint for eavesdropping on all the data you pipe out to the internet. Now security researchers have found a broad, apparently state-sponsored hacking operation that goes a step further, using hacked routers as a foothold to drop highly sophisticated spyware even deeper inside a network, onto the computers that connect to those compromised internet access points.

Researchers at security firm Kaspersky on Friday revealed a long-running hacking campaign, which they call "Slingshot," that they believe planted spyware on more than a hundred targets in 11 countries, mostly in Kenya and Yemen. The hackers gained access to the deepest level of victim computers' operating system, known as the kernel, taking full control of target machines. And while Kaspersky's researchers haven't yet determined how the spyware initially infected the majority of those targets, in some cases the malicious code had been installed via small-business-grade routers sold by the Latvian firm MikroTik, which the Slingshot hackers had compromised.

Use of this site constitutes acceptance of our user agreement (effective 3/21/12) and privacy policy (effective 3/21/12). Affiliate link policy . Your California privacy rights . The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of Condé Nast .

A router [a] is a networking device that forwards data packets between computer networks . Routers perform the traffic directing functions on the Internet . A data packet is typically forwarded from one router to another router through the networks that constitute an internetwork until it reaches its destination node . [2]

A router is connected to two or more data lines from different networks. [b] When a data packet comes in on one of the lines, the router reads the network address information in the packet to determine the ultimate destination. Then, using information in its routing table or routing policy , it directs the packet to the next network on its journey.

The most familiar type of routers are home and small office routers that simply forward IP packets between the home computers and the Internet. An example of a router would be the owner's cable or DSL router, which connects to the Internet through an Internet service provider (ISP). More sophisticated routers, such as enterprise routers, connect large business or ISP networks up to the powerful core routers that forward data at high speed along the optical fiber lines of the Internet backbone . Though routers are typically dedicated hardware devices, software-based routers also exist.

A router [a] is a networking device that forwards data packets between computer networks . Routers perform the traffic directing functions on the Internet . A data packet is typically forwarded from one router to another router through the networks that constitute an internetwork until it reaches its destination node . [2]

A router is connected to two or more data lines from different networks. [b] When a data packet comes in on one of the lines, the router reads the network address information in the packet to determine the ultimate destination. Then, using information in its routing table or routing policy , it directs the packet to the next network on its journey.

The most familiar type of routers are home and small office routers that simply forward IP packets between the home computers and the Internet. An example of a router would be the owner's cable or DSL router, which connects to the Internet through an Internet service provider (ISP). More sophisticated routers, such as enterprise routers, connect large business or ISP networks up to the powerful core routers that forward data at high speed along the optical fiber lines of the Internet backbone . Though routers are typically dedicated hardware devices, software-based routers also exist.

Routers, both the big corporate kind and the small one gathering dust in the corner of your home, have long made an attractive target for hackers . They're always on and connected, often full of unpatched security vulnerabilities , and offer a convenient chokepoint for eavesdropping on all the data you pipe out to the internet. Now security researchers have found a broad, apparently state-sponsored hacking operation that goes a step further, using hacked routers as a foothold to drop highly sophisticated spyware even deeper inside a network, onto the computers that connect to those compromised internet access points.

Researchers at security firm Kaspersky on Friday revealed a long-running hacking campaign, which they call "Slingshot," that they believe planted spyware on more than a hundred targets in 11 countries, mostly in Kenya and Yemen. The hackers gained access to the deepest level of victim computers' operating system, known as the kernel, taking full control of target machines. And while Kaspersky's researchers haven't yet determined how the spyware initially infected the majority of those targets, in some cases the malicious code had been installed via small-business-grade routers sold by the Latvian firm MikroTik, which the Slingshot hackers had compromised.

Use of this site constitutes acceptance of our user agreement (effective 3/21/12) and privacy policy (effective 3/21/12). Affiliate link policy . Your California privacy rights . The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of Condé Nast .

A home broadband router has two IP addresses —one is its own private address on the local network and the other is the external, public IP address that's used for communicating with outside networks on the internet.

The external facing address managed by a router is set when it connects to the internet service provider with a broadband modem . This address can be seen from web-based IP lookup services such as  IP Chicken  and also from within the router itself.

It's a similar process with other manufacturers, but on Linksys routers, you can see the public IP address on the Status page in the Internet section. NETGEAR routers might call this address the Internet Port IP Address and have it listed in the  Maintenance > Router Status  screen.

A router [a] is a networking device that forwards data packets between computer networks . Routers perform the traffic directing functions on the Internet . A data packet is typically forwarded from one router to another router through the networks that constitute an internetwork until it reaches its destination node . [2]

A router is connected to two or more data lines from different networks. [b] When a data packet comes in on one of the lines, the router reads the network address information in the packet to determine the ultimate destination. Then, using information in its routing table or routing policy , it directs the packet to the next network on its journey.

The most familiar type of routers are home and small office routers that simply forward IP packets between the home computers and the Internet. An example of a router would be the owner's cable or DSL router, which connects to the Internet through an Internet service provider (ISP). More sophisticated routers, such as enterprise routers, connect large business or ISP networks up to the powerful core routers that forward data at high speed along the optical fiber lines of the Internet backbone . Though routers are typically dedicated hardware devices, software-based routers also exist.

Routers, both the big corporate kind and the small one gathering dust in the corner of your home, have long made an attractive target for hackers . They're always on and connected, often full of unpatched security vulnerabilities , and offer a convenient chokepoint for eavesdropping on all the data you pipe out to the internet. Now security researchers have found a broad, apparently state-sponsored hacking operation that goes a step further, using hacked routers as a foothold to drop highly sophisticated spyware even deeper inside a network, onto the computers that connect to those compromised internet access points.

Researchers at security firm Kaspersky on Friday revealed a long-running hacking campaign, which they call "Slingshot," that they believe planted spyware on more than a hundred targets in 11 countries, mostly in Kenya and Yemen. The hackers gained access to the deepest level of victim computers' operating system, known as the kernel, taking full control of target machines. And while Kaspersky's researchers haven't yet determined how the spyware initially infected the majority of those targets, in some cases the malicious code had been installed via small-business-grade routers sold by the Latvian firm MikroTik, which the Slingshot hackers had compromised.

Use of this site constitutes acceptance of our user agreement (effective 3/21/12) and privacy policy (effective 3/21/12). Affiliate link policy . Your California privacy rights . The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of Condé Nast .

A home broadband router has two IP addresses —one is its own private address on the local network and the other is the external, public IP address that's used for communicating with outside networks on the internet.

The external facing address managed by a router is set when it connects to the internet service provider with a broadband modem . This address can be seen from web-based IP lookup services such as  IP Chicken  and also from within the router itself.

It's a similar process with other manufacturers, but on Linksys routers, you can see the public IP address on the Status page in the Internet section. NETGEAR routers might call this address the Internet Port IP Address and have it listed in the  Maintenance > Router Status  screen.

NeoRouter is a zero-configuration VPN solution that lets you build and manage LAN-like private networks over the Internet.

All of your remote computers and devices can be directly connected each other, thereby giving users network access to the network resources they need.

Instantly work on your files, programs and network, just as if you were at your desk. Freedom to work from home, public cafe, hotel or while travelling.


51DmvaR6EUL