This article is rated Start-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | ||||||||||||||||||||||||||||||||
|
This article is prone to spam. Please monitor the References and External links sections. |
Shouldn't how illegal it is to setup a rogue access point via mac address spoofing be mentioned before the reader is told how to spoof? Seems like a good idea... haha. 128.193.216.16 (talk) 17:37, 9 December 2010 (UTC)
This article is not good. Talking about regedit and iwconfig without talking about what mac spoofing is and how it works does not make sence....
Just like using good grammar? —Preceding unsigned comment added by 137.99.135.148 (talk) 19:52, 22 February 2009 (UTC)
Does MAC spoofing actually change the real MAC address of the card, or just settings in the OS. For example, if I MAC spoof and move the network card to another PC, or install a new OS, will the spoofed MAC remain? Mwv2 (talk) 14:15, 28 September 2009 (UTC)
MAC is theoretically static. The change would only apply on that machine. —Preceding unsigned comment added by 134.29.251.20 (talk) 01:36, 21 October 2009 (UTC)
MAC address is psudo-unique and only needs to be unique on a local network. Changing the MAC address is not permanent unless you edit a cards firmware. Good wireless cards allow you to temporarily change your MAC address in the operating system, but not all cards allow this. There are many good reasons to spoof your MAC address. Particularly when privacy is required. If you need privacy when connecting to a public network, using a global unique identifier is a stupid idea. What would be useful in this page would be a list of MAC spoof capable devices. 66.188.45.50 (talk) 17:43, 20 August 2010 (UTC)
Grammar
editThere are several grammar errors in the article, I fixed one of them but I would prefer that an English major (or someone who likes grammar more than I do) takes a look at the page. — Preceding unsigned comment added by 70.248.67.185 (talk) 05:50, 20 February 2013 (UTC)
- I've started on the grammar edits. This will take a while, since the grammar is quite poor. So far I've updated through the first major section. I will let you know when I've finished. Icesword2 (talk) 05:11, 21 February 2013 (UTC)
- And done. Please review. Icesword2 (talk) 05:33, 21 February 2013 (UTC)
Useless information
editI came here to see how is MAC spoofing done. And no word about it. If the article on MAC spoofing doesn't show how it's done, then what is the article for? Are you so afraid of lawsuits? — Preceding unsigned comment added by WPIsTransient (talk • contribs) 23:49, 1 April 2013 (UTC)
Sources modified on MAC spoofing
editHello fellow Wikipedians,
I have just attempted to maintain the sources on MAC spoofing. I managed to add archive links to 1 source, out of the total 1 I modified, whiling tagging 0 as dead.
Please take a moment to review my changes to verify that the change is accurate and correct. If it isn't, please modify it accordingly and if necessary tag that source with {{cbignore}}
to keep Cyberbot from modifying it any further. Alternatively, you can also add {{nobots|deny=InternetArchiveBot}}
to keep me off the page's sources altogether. Let other users know that you have reviewed my edit by leaving a comment on this post.
Cheers.—cyberbot IITalk to my owner:Online 17:37, 28 June 2015 (UTC)
Bunch of Useless Stuff
editThere is only a use-case like thing in this article. Compared to Wikipedia of this article, users will find more information on other blogs. How does the process of changing a MAC address actually works is still not mentioned in this article. There is a line which says "Drivers allow changing MAC address. They don't let the Operating System know about original MAC address". And the part about how driver actually does that is missing. If Wikipedia becomes a source of incomplete information, no one would visit it for information.
- How the MAC change actually works is up to the device/NIC, there is no general answer. --Zac67 (talk) 09:04, 7 October 2018 (UTC)