irst of all discuss something about IP addresses -IP address- every system connected to a network has a unique 32 bit IP address divided into four fields of 8 bit each. An hackers first step is to find out IP of the targeted system. A remote IP address ca