Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{175852,
author = {Rokesh Varma V and Hema Prabha G and Rohit D and Sanjay S and Shreyas S},
title = {Cyber Cloak},
journal = {International Journal of Innovative Research in Technology},
year = {2025},
volume = {11},
number = {11},
pages = {4549-4553},
issn = {2349-6002},
url = {https://ijirt.org/article?manuscript=175852},
abstract = {Cyber Cloak (CC), is a comprehensive security solution designed to deliver stealth, insight, and protection in the digital world. Recognizing the critical need for anonymity, visibility, and robust security, it combines three powerful features: IP ghosting, port scanning, and vulnerability scanning. These capabilities empower users with unprecedented control over their online presence, network awareness, and threat mitigation efforts. The IP Ghosting Tool ensures anonymous browsing by concealing IP addresses and locations, safeguarding users from tracking and surveillance. The Port Scanner helps identify open ports and detect potential security risks, optimizing network configurations for enhanced performance and security.},
keywords = {Networking, IP protection and VPN},
month = {April},
}
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry