![]() ![]() ![]() If users intend to use an untrusted, public network then MAC spoofing should be considered. However, other computers on the local network can potentially log it, which would then provide proof the user's computer connected to that specific network. The MAC address is normally not traceable because it is not passively sent to computers beyond the local router. MAC addresses are stored in hardware and are used to assign an address to computers on the local network. 4.3 Using Personal Computers in a Public NetworkĪll network cards, both wired and wireless, have a unique identifier called a MAC address.3.1 Authentication Fingerprinting Techniques. ![]()
0 Comments
Leave a Reply. |