{{::c.i18n.search_categories}}

Half the time I lose them after using the word schematic, but either way — lose them there or not — I can NEVER find the words to make it understandable! Thanks Leo! Hi Leo, First time visited your site and found this article very interesting. Thanks a millions for the wonderful information. Just a quick question..

Decoding the MAC Address

Is there a way to mask or hide my machine information like OS, browser version, other settings etc from Java Code or ActiveX or JavaScript being run from a website? Like if a website is trying to get my Device Finger Print, how can I prevent or block or mask that? Thanks a lot!! I think a better way to convey the mac address is to liken it to a post office box. You have a specific box number assigned to you.

How to find out Unicast, Multicast and Broadcast address in MAC

And if you decide to change it later, you can. In response to the Vagaters comment: Vagaters uses a mix of data available through the browser and http connection to try to identify banned users. Regular IP or cookie bans, which most other chats use, have proven to be inefficient. The site uses the camamba. Leo — Thanks for the insightful piece. As you have noted in many other posts, the recipient of an email sent from Google, Yahoo, etc can often glean the IP address from which it was sent. Thanks, J Levin.

Navigation menu

Hi Leo, Very well explained and similied. Thank you. Thanks a lot. Very simply and effectively u clarified my doubts Thanx Leo…. I was very much confused initially but now very much relaxed. Post office example was awesome.

MAC address (media access control)

Well stated Leo. Could you further expand on the difference with a mobile device MAC address vs a standard desktop or laptop? I logged into my wireless network and someone hacked into my network. Can that be traced to the exact location if I provide the Mac Address? Mac You could only determine who hacked into your account if you know who happens to own the machine with that MAC address. There is no registry where MAC address are stored.

I have a doubt. In data link layer we use mac address.


  1. Hey Nick. Meet Mac..
  2. ms office for mac free trial download?
  3. google chrome browser for mac 10.4?
  4. open finder window shortcut mac?
  5. blackberry desktop manager for mac z10?

Why can not we use ip address instead of mac address in data link layer. Using your analogy, if the color of my mailbox has changed then my mail carrier should still be able to deliver the mail, correct? Recently one incident happened in our office.

MAC address

Someone sent emails from rediff to one girl and the IP address shown was of our office. The police found our office IP and they found some port no. I am confused how the ISP gave port no. My friend is genuine and he hasnt done aytign wrong. They only typically go as far as the first router. Using the metaphor, if all incoming mail is addressed only to the mail room how does the mail clerk know who to send it to? Packets coming into the router can only be responses to packets sent by a computer within your network.

Think of the packets you send out as having a complete return address so responses know where to go. Packets which are not responses — i. Thanks Ray. I will reword my question. There are probably many internal computers, how does the router choose between them? In simpler term, the router knows it was your computer sending the outgoing packets, so it knows where to send the incoming packets which come in response to the request.

MAC addresses were originally meant to be pre-allocated and unchangeable but some devices [often home Internet routers] allow MAC addresses to be changed. IP addresses are also allocated to network devices [that are enabled and connected]. If you connect a laptop wirelessly and with an Ethernet cable to your Router, you will have two IP addresses, one for the network cable with the cable pugged in and one for the wireless adapter.


  • Need to Contact Support?.
  • call of duty demo free download mac?
  • MAC Addresses With Formatting Examples.
  • page breaks in excel mac 2020?
  • I wish I had thought of it when I was teaching this subject. Hey Leo, Just wanted to point out that your posts are great!


    • fritz 13 free download for mac?
    • How to Locate Your Ethernet MAC Address | Information Technology Group.
    • free flyer templates for mac?
    • You make it very easy to understand for guys like me who are new to the IT world. Please keep them coming. Spoofing or masking your IP Address can be traced only so far depending on how many changes that address makes. Great article! Hello, I got a pc from my friend, it was his old pc but with a new hard drive. My question is do i have his MAC address now or do i have the same one i had with my old pc?

      Also if i have his MAC address can i see which websites he visited and how can i delete it? PC was formated and cleaned with new hard drive. What matters is: this technique wifi mac sniffing plus big data analysis can make a very accurate portrait of you so they can send you very accurate ads; they can conduct very accurate location tracking using this technique as well.

      How do I find the MAC address on my computer? | Information Technology Services

      A LOT of things have to happen for that scenario you outline to play out. The important lesson? Be careful what you download. Comments violating those rules will be removed. Comments that don't add value will be removed, including off-topic or content-free comments, or comments that look even a little bit like spam.

      All comments containing links and certain keywords will be moderated before publication. I want comments to be valuable for everyone, including those who come later and take the time to read. Ask Leo! Contact My Account 0. Search Ask Leo! And can you hide them? Podcast audio. I'll give a conceptual overview. I'll explain why that is and why it's a good thing.