The security problem on the Internet can become your problem if you did not take care in a timely manner, for example, to protect your electronic mail box. How to calculate a cracker?
![Image Image](https://images.culturehatti.com/img/kultura-i-obshestvo/35/kak-vichislit-vzlomshika.jpg)
Instruction manual
1
Go to the security settings of your mailbox (if you still have access to it). For example, if you use www.mail.ru , the address of the security tab will be: http://win.mail.ru/cgi-bin/security?1977996848 . Look at which IP addresses the last login to the mailbox was made. Next, go to one of the WHOIS services (for example, www.ruszone.com/whois/ip.php ). Find out who this IP is assigned to. It is likely that in this case you will not receive comprehensive information about the end user, but still significantly narrow the circle of suspected individuals.
2
When registering a mailbox, send a letter to the mail administration with a request to monitor your account. In this case, administrators will install a program on your account that prohibits login from other IP addresses. Depending on the postal service, this service may be paid. On some mail services, the user himself can use similar settings in the "Security" tab (for example, by checking or unchecking the "Session from only one IP address on www.mail.ru " option ).
3
Go to the site http://lantricks.ru and use one of the programs posted on this page to collect more complete information about the IP address or site from which the hack was committed. After that, contact the provider serving this address and website with the request to take appropriate measures to prevent further attempts of unauthorized access to information. It may happen that you are refused, but you can agree and informally.
4
Find out the name of the computer on the network using a simpler method. Press Win + R. In the search bar of the window that appears, type "cmd", click "OK". At the command prompt, enter "nslookup" the IP address of the computer whose name you want to find out, press enter.
5
Get familiar with the methods of protection against hackers and scammers on the sites of well-known bloggers, for example, www.igor-belkin.ru .