Question for IT experts.

by badseed 22 Replies latest jw friends

  • mummatron
    mummatron

    @BOC - You're correct. You cannot mask or change the MAC address. (Well, it's not impossible but you'd need an advanced knowlege of micro electronics and low level programming.)

    @badseed - Unless you're trying to hack the Pentagon or download some truly vile genre of pornography, then I wouldn't worry too much. Most wifi hotspots in cafes are just a wireless router connected to a PC in the back office. The router could have a policy that disallows reconnection by the same MAC within a certain time period, but unless it's a well administered network with a server set up as a proxy or default gateway (e.g. a Microsoft ISA server) then it's unlikely that your MAC address would get stored. From experience of managing a network with that kind of set up, there can be so much network traffic that logs are stored in text files by design to save on drive space, thus it isn't a quick job to trawl through logs and find specific MAC addresses or IPs. In my case it was only ever done out of necessity - i.e. if one of our clients requested it due to suspicion of an employee's activity. Manufacturers keep records of the MAC addresses of their manufactured items, but it becomes difficult to trace the owner from the point of retail onwards. Put it this way, I'm sure there are covert government operatives who buy second hand IT equipment, use, and then destroy!

  • DesirousOfChange
    DesirousOfChange

    What if you're just worried about being connected from your email address to your visits to various apostate websites LIKE THIS ONE??

    My understanding from a friends son ([email protected]) who was nailed and DFd because of his internet activities was that he had a separate email account "apostate1@yahoo" that was the same as his JWN name (apostate1) and by sending emails from his personal computer to JWs using both yahoo accounts they were able to "link" him to the apostate emails.

    Any of this make any sense?

    DOC

  • J. Hofer
    J. Hofer

    spoofing the MAC is pretty easy.. at least on linux, mac and other unixoid systems it's a one liner on the shell. there should be tools for window too.

    anony mous pretty much summed the whole security stuff up.

  • badseed
    badseed

    Thanks Anony Mous. The last paragraph was quite hilarious. I wish. "and MAYBE they won't find you"..after all those efforts..lol

    mummatron, nothing that illegal, especially not trying to hack the pentagon (i'm crazy but not that crazy).

  • badseed
    badseed

    J. Hofer, that's what I read anyway. I'll just find myself some linux os and do it that way.

  • mummatron
    mummatron

    @J.Hofer - there are tools to spoof it on Windows, but they're usually ineffective on many newer Vista & Win 7 systems. You can sometimes get round this by installing an older driver for the Network Interface Card and changing via the driver's GUI, but that may cause other issues, so I certainly wouldn't recommend it unless you're used to connectivity troubleshooting and can clean all traces of previous drivers off your system to prevent errors occuring when you uninstall/reinstall. Above I was referring to a permanent hardware change to a 'legitimate' (unused) MAC address. Of course, it's so much simpler with a 'nix based system, and in a ideal world we'd all be using them (would've made my work life so much simpler than faffing with Windows & I much prefer using Unix webservers - so beautifully simple to adminsiter) but the majority of users asking these kind of questions are gonna be using Windows, so saying something's possible using a shell script in Ubuntu is gonna make 'em think they've been sold a dud laptop and I doubt they'd really want to delve into the World of MS-alternative OS's and dual-booting just to rectify a wireless security query. I've had instances in my career where I've had to calm irrate clients when a member of my team has told them in all innocence that X is possible in Red Hat etc, and then the client's gotten on their high horse and accused the company I worked for for selling them 'sub-standard' systems. D'oh! *faceplam*

    @DesirousOfChange - It makes sense. The key there is being careful. Always sign out of e-mail accounts & JWN. Lock your screen when leaving the computer unattended. Keep a separate user profile with a password that the rest of the household won't guess. Use in-private browsing or clear your browser history. Use your apostate e-mail address for apostate activities only. Maybe your friend's son subconsciously wanted to be caught

  • mummatron
    mummatron
    Then burn all of the possible evidence, your clothes, your disguises and then take the laptop's hard drive out in order to destroy with self-made (not bought) thermite.

    @Anony Mous - the clothes would have to be a [hitman's choice] pristine virgin wool suit (though a HazMat suit would be better) purchased from a backstreet tailor who supplies suits to the Mafia on a no-questions-asked basis. This would be to ensure minimal fibre samples are left at the scene and that your suit cannot be traced to your local highsteet menswear outlet where they'd have CCTV footage of your purchase. The suit will be somewhat flame-retardant, so when you're done with it, best to siphon some petrol (too risky to be seen buying it with petrol station security these days) and douse it before you set it alight.

  • DesirousOfChange
    DesirousOfChange

    @DesirousOfChange - It makes sense. The key there is being careful. Always sign out of e-mail accounts & JWN. Lock your screen when leaving the computer unattended. Keep a separate user profile with a password that the rest of the household won't guess. Use in-private browsing or clear your browser history. Use your apostate e-mail address for apostate activities only. Maybe your friend's son subconsciously wanted to be caught

    Mumma, my recollection of the explanation I was told is that emails display the sender's IP address somewhere in the details, thus the IP address was the same for all of his emails, regardless of which email account he was using. (Make any sense?) So, when he sent an email from his normal, everyday email address it displayed the same IP adderss as the emails he anonymously sent from his apostate email addy.

    DOC

  • botchtowersociety
    botchtowersociety

    But I do not think there is any way of masking your MAC.

    MACs are spoofable...but the MAC address information is usually limited to the local broadcast domain anyway--it won't cross a logical network during normal circumstances.

  • J. Hofer
    J. Hofer

    mummatron, i know exactly what you are talking about...

    if one does something security related once in a while only and isn't afraid of the penguin, i'd recommend using a "live" distro on a usb stick. this way no info get's written onto the disk and you still can install all the packages and configure all the services persistently.

Share this

Google+
Pinterest
Reddit