Solved

Help on MAC Addrses

Posted on 2002-03-16
5
133 Views
Last Modified: 2010-04-14
Hi friends,

How i will access remote computer if i know the mac address of remote comuter.

Thank you

narendra
0
Comment
Question by:narendrakumar1978
5 Comments
 
LVL 32

Expert Comment

by:jhance
Comment Utility
Please be more specfic.  

You don't normally communicate with a remote computer via its MAC address.  In fact I'm only aware of one protocol that does this, namely the Microsoft NETBEUI protocol.  The problem with such a protocol is that it's unroutable.  Since MAC addresses are essentially "random" from a network point of view, there is no way to know where a particular MAC address "lives" without broadcasting your message to the entire world.  Obviously that both impractical and undesirable.

More advanced protocols like TCPIP don't use the MAC address to route the message.  They use a hierarchical address.  The most significant parts of the address specify the NETWORK where the remote host lives and the least significant parts specify the specific HOST you want.  (Which parts are which is the basis for the commonly misunderstood NETMASK or SUBNET MASK TCPIP property but that's another discussion....)

On the INTERNET (which is TCPIP based) you cannot reliably locate the IP address of a host from its MAC address.  There is a protocol called RARP (Reverse Address Resolution Protocol) that will provide the IP from a MAC but a RARP server can only resolve hosts from whom it's heard traffic.  Usually this is only the local network and whatever remote hosts it has seen packets from.
0
 
LVL 2

Author Comment

by:narendrakumar1978
Comment Utility
Hi,

You are right and i know this but is there any software u know through that i can hack the remote computer if i know the mac and ip address of remote computer...


narendra
\
0
 
LVL 32

Expert Comment

by:jhance
Comment Utility
I think you're looking for help in the wrong place.

Try one of the "kiddie" hacker/cracker/warez site and go away from here!
0
 
LVL 12

Expert Comment

by:benhanson
Comment Utility
There is software that you could use to hack the other computer if you knew it's mac and IP address.  You'd just need to find some of that software and then it would be easy.

Right.

Get a clue.
0
 

Accepted Solution

by:
ComTech earned 0 total points
Comment Utility
narendrakumar1978,

3. Guidelines for Use
Experts Exchange Services and Site are only available for use by individuals who are age 13 or over. The Services and Site may not be used by scripts, machines or automated services.

Experts Exchange Services and Site may be used only for lawful purposes. You must comply with all applicable local, state, national and international laws, regulations or conventions, including without limitation those related to data privacy, international communications, and exportation of technical or personal data. You may not use the Experts Exchange Services or Site for any criminal or illegal activities or any activities that might be legally actionable.

Experts Exchange reserves the right to determine what constitutes Internet abuse and objectionable conduct. If Experts Exchange believes, in its sole discretion, that a violation of these Guidelines has occurred, it may take responsive action. Such action may /include, but not be limited to, permanent removal of illegal or inappropriate information or content, or suspension or termination of your membership and access to Experts Exchange Service

* using a Member Name or posting, transmitting or linking to any text or images that are sexually explicit, pornographic, violent, racially or ethnically objectionable or grossly offensive to the online community

* posting, transmitting or linking to defamatory and libelous statements or other statements that would violate any third party's privacy or publicity rights

* posting, transmitting or linking to profane language, descriptions of situations or scenarios considered, in the opinion of Experts Exchange, inappropriate for the Experts Exchange membership

* impersonating any person or using a name that you are not authorized to use

* planning illegal activities, such as creating computer viruses, building a bomb or counterfeiting money

* advertising, promoting in any way or offering to sell any goods or services for any commercial purpose

* soliciting individuals for employment other than in designated areas (for example, within a discussion thread)

* soliciting individuals to join other services comparable to or competitive with Experts Exchange

* promoting any products or services that are unlawful at the location at which the content is posted or received

* posting any content that infringes any third party's intellectual property rights or violates any confidentiality agreements or contracts of employment

* posting, transmitting or linking to statements that are intentionally false or misleading

* introducing viruses, worms, harmful codes or Trojan horses

* spamming, flaming or other similar activities

* misusing the Experts Exchange point system

* violating the guidelines for academic honesty or other unethical behavior.

Violations of system and network security are prohibited. You may not misuse system resources including but not limited to employing posts or programs which consume excessive CPU time or storage space, permitting use of mail services, mail forwarding capabilities, POP accounts or auto-responders other than for your own account. If you notice a problem with other members not following these Guidelines, please notify us by contacting Community Support.

Hacking does follow under these guidlines, and such questions are not allowed on Experts Exchange.

I am locking this question due to content in your second remark regarding Hacking.  If no reasonable explinatin if forthcoming, this queston will be deleted.

ComTech
CS Admin @ EE


0

Featured Post

How your wiki can always stay up-to-date

Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
- Increase transparency
- Onboard new hires faster
- Access from mobile/offline

Join & Write a Comment

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Describes a method of obtaining an object variable to an already running instance of Microsoft Access so that it can be controlled via automation.
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now