Help on MAC Addrses

Hi friends,

How i will access remote computer if i know the mac address of remote comuter.

Thank you

Who is Participating?
ComTechConnect With a Mentor Commented:

3. Guidelines for Use
Experts Exchange Services and Site are only available for use by individuals who are age 13 or over. The Services and Site may not be used by scripts, machines or automated services.

Experts Exchange Services and Site may be used only for lawful purposes. You must comply with all applicable local, state, national and international laws, regulations or conventions, including without limitation those related to data privacy, international communications, and exportation of technical or personal data. You may not use the Experts Exchange Services or Site for any criminal or illegal activities or any activities that might be legally actionable.

Experts Exchange reserves the right to determine what constitutes Internet abuse and objectionable conduct. If Experts Exchange believes, in its sole discretion, that a violation of these Guidelines has occurred, it may take responsive action. Such action may /include, but not be limited to, permanent removal of illegal or inappropriate information or content, or suspension or termination of your membership and access to Experts Exchange Service

* using a Member Name or posting, transmitting or linking to any text or images that are sexually explicit, pornographic, violent, racially or ethnically objectionable or grossly offensive to the online community

* posting, transmitting or linking to defamatory and libelous statements or other statements that would violate any third party's privacy or publicity rights

* posting, transmitting or linking to profane language, descriptions of situations or scenarios considered, in the opinion of Experts Exchange, inappropriate for the Experts Exchange membership

* impersonating any person or using a name that you are not authorized to use

* planning illegal activities, such as creating computer viruses, building a bomb or counterfeiting money

* advertising, promoting in any way or offering to sell any goods or services for any commercial purpose

* soliciting individuals for employment other than in designated areas (for example, within a discussion thread)

* soliciting individuals to join other services comparable to or competitive with Experts Exchange

* promoting any products or services that are unlawful at the location at which the content is posted or received

* posting any content that infringes any third party's intellectual property rights or violates any confidentiality agreements or contracts of employment

* posting, transmitting or linking to statements that are intentionally false or misleading

* introducing viruses, worms, harmful codes or Trojan horses

* spamming, flaming or other similar activities

* misusing the Experts Exchange point system

* violating the guidelines for academic honesty or other unethical behavior.

Violations of system and network security are prohibited. You may not misuse system resources including but not limited to employing posts or programs which consume excessive CPU time or storage space, permitting use of mail services, mail forwarding capabilities, POP accounts or auto-responders other than for your own account. If you notice a problem with other members not following these Guidelines, please notify us by contacting Community Support.

Hacking does follow under these guidlines, and such questions are not allowed on Experts Exchange.

I am locking this question due to content in your second remark regarding Hacking.  If no reasonable explinatin if forthcoming, this queston will be deleted.

CS Admin @ EE

Please be more specfic.  

You don't normally communicate with a remote computer via its MAC address.  In fact I'm only aware of one protocol that does this, namely the Microsoft NETBEUI protocol.  The problem with such a protocol is that it's unroutable.  Since MAC addresses are essentially "random" from a network point of view, there is no way to know where a particular MAC address "lives" without broadcasting your message to the entire world.  Obviously that both impractical and undesirable.

More advanced protocols like TCPIP don't use the MAC address to route the message.  They use a hierarchical address.  The most significant parts of the address specify the NETWORK where the remote host lives and the least significant parts specify the specific HOST you want.  (Which parts are which is the basis for the commonly misunderstood NETMASK or SUBNET MASK TCPIP property but that's another discussion....)

On the INTERNET (which is TCPIP based) you cannot reliably locate the IP address of a host from its MAC address.  There is a protocol called RARP (Reverse Address Resolution Protocol) that will provide the IP from a MAC but a RARP server can only resolve hosts from whom it's heard traffic.  Usually this is only the local network and whatever remote hosts it has seen packets from.
narendrakumar1978Author Commented:

You are right and i know this but is there any software u know through that i can hack the remote computer if i know the mac and ip address of remote computer...

I think you're looking for help in the wrong place.

Try one of the "kiddie" hacker/cracker/warez site and go away from here!
There is software that you could use to hack the other computer if you knew it's mac and IP address.  You'd just need to find some of that software and then it would be easy.


Get a clue.
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.