The article on "Getting At Your PC’s Media Access Control ID Number" ( http://langa.com/newsletters/2004/2004-11-22.htm#2 ) brought this informative note:
You wrote: "MAC identification isn’t a foolproof security method". You can say that again! Spoofing a MAC address is simple using readily available utility programs, and MAC spoofing is even a standard feature on many DSL/Cable routers.
– Kevin Davidson
Thanks, Kevin. Using a MAC as the sole authentication for a network would be risky (and many wireless LANs are set up this way), but use of MAC addresses is still a generally good thing when it’s done as one of several overlapping security techniques. See "Wireless Poachers, Wireless Guests" at http://www.informationweek.com/story/IWK20021031S0004 .
Get our unique weekly Newsletter with tips and techniques, how to's and critical updates on Windows 7, Windows 8, Windows XP, Firefox, Internet Explorer, Google, etc. Join our 480,000 subscribers!
Subscribe and get our monthly bonuses - free!
Your hard drives store photos, books, music and film libraries, letters, financial documents and so on. This ebook is aimed at helping you understand your hard drives, expand their capacities and length of life, and recover what you can from them when they fail. We're offering you a FREE Excerpt! Get this excerpt and other 4 bonuses if you subscribe FREE now!