Jump to content

Recommended Posts

Posted

It's not actually very difficult pretending to be a different device.

http://en.wikipedia.org/wiki/MAC_address

http://en.wikipedia.org/wiki/MAC_spoofing

http://www.wikihow.com/Spoof-a-MAC-Address

But one is wondering exactly why you need to do this, the MAC is supposed to be unique to a particular network device??

Maybe hes a botter and got banned? Some gaming company's ban hardware address to banned users to prevent them getting back on..

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.



×
×
  • Create New...