Talk:MAC spoofing

From Wikipedia, the free encyclopedia
Jump to: navigation, search
WikiProject Computer Security / Computing  (Rated Stub-class)
WikiProject icon This article is within the scope of WikiProject Computer Security, a collaborative effort to improve the coverage of computer security on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
Stub-Class article Stub  This article has been rated as Stub-Class on the project's quality scale.
 ???  This article has not yet received a rating on the project's importance scale.
Taskforce icon
This article is supported by WikiProject Computing.
 
WikiProject Computing / Networking (Rated Stub-class)
WikiProject icon This article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
Stub-Class article Stub  This article has been rated as Stub-Class on the project's quality scale.
 ???  This article has not yet received a rating on the project's importance scale.
Taskforce icon
This article is supported by Networking task force.
 

Shouldn't how illegal it is to setup a rogue access point via mac address spoofing be mentioned before the reader is told how to spoof? Seems like a good idea... haha. 128.193.216.16 (talk) 17:37, 9 December 2010 (UTC)

This article is not good. Talking about regedit and iwconfig without talking about what mac spoofing is and how it works does not make sence....

Just like using good grammar? —Preceding unsigned comment added by 137.99.135.148 (talk) 19:52, 22 February 2009 (UTC)


Does MAC spoofing actually change the real MAC address of the card, or just settings in the OS. For example, if I MAC spoof and move the network card to another PC, or install a new OS, will the spoofed MAC remain? Mwv2 (talk) 14:15, 28 September 2009 (UTC)

MAC is theoretically static. The change would only apply on that machine. —Preceding unsigned comment added by 134.29.251.20 (talk) 01:36, 21 October 2009 (UTC)

MAC address is psudo-unique and only needs to be unique on a local network. Changing the MAC address is not permanent unless you edit a cards firmware. Good wireless cards allow you to temporarily change your MAC address in the operating system, but not all cards allow this. There are many good reasons to spoof your MAC address. Particularly when privacy is required. If you need privacy when connecting to a public network, using a global unique identifier is a stupid idea. What would be useful in this page would be a list of MAC spoof capable devices. 66.188.45.50 (talk) 17:43, 20 August 2010 (UTC)

Grammar[edit]

There are several grammar errors in the article, I fixed one of them but I would prefer that an English major (or someone who likes grammar more than I do) takes a look at the page. — Preceding unsigned comment added by 70.248.67.185 (talk) 05:50, 20 February 2013 (UTC)

I've started on the grammar edits. This will take a while, since the grammar is quite poor. So far I've updated through the first major section. I will let you know when I've finished. Icesword2 (talk) 05:11, 21 February 2013 (UTC)
And done. Please review. Icesword2 (talk) 05:33, 21 February 2013 (UTC)

Useless information[edit]

I came here to see how is MAC spoofing done. And no word about it. If the article on MAC spoofing doesn't show how it's done, then what is the article for? Are you so afraid of lawsuits? — Preceding unsigned comment added by WPIsTransient (talkcontribs) 23:49, 1 April 2013 (UTC)

Sources modified on MAC spoofing[edit]

Hello fellow Wikipedians,

I have just attempted to maintain the sources on MAC spoofing. I managed to add archive links to 1 source, out of the total 1 I modified, whiling tagging 0 as dead.

Please take a moment to review my changes to verify that the change is accurate and correct. If it isn't, please modify it accordingly and if necessary tag that source with {{cbignore}} to keep Cyberbot from modifying it any further. Alternatively, you can also add {{nobots|deny=InternetArchiveBot}} to keep me off the page's sources altogether. Let other users know that you have reviewed my edit by leaving a comment on this post.

Cheers.—cyberbot IITalk to my owner:Online 17:37, 28 June 2015 (UTC)