How to Spoof WAN MAC Address in DD-WRT

First, what is a MAC address and why might you want to alter, clone, or spoof it? MAC stands for Media Access Control and it’s a (theoretically) unique 12 hexadecimal digit identifier for a specific piece of network hardware. An example could look like 01-23-45-67-89-AB (remember hexadecimal digits range from 0 to F).

Now why might you want to spoof, clone or alter it? Some examples may include avoiding having to register a new router’s MAC address to an internet service provider, or to obfuscate a network monitor’s ability to tie traffic to a particular piece of hardware, or to circumvent a MAC address blacklist filter preventing a device from connecting.

Continue reading

How to Run an MD5 or SHA-1 Hash on Windows

A cryptographic hash value can be thought of, and is often referred to as, a fingerprint. They are also referred to as simply hashes or check-sums. What they are though are alphanumeric identifiers produced by a cryptographic function being run on a file.

In addition to just being plain cool, this can be very useful if you have an occupation where you may need to verify updated versions of a particular file, or if you need to differentiate unique files of the same name.

Continue reading

How to Encrypt Your Mac’s Hard Drive

Without a moments notice, your life could be thrown into chaos. A thief nabs your laptop. It’s not just that the computer itself is valuable, it’s not even the lost family photos or essays in progress, it’s your passwords, identity information, enough for a savvy thief to ruin your finances. But then you breathe a sigh of relief as you remember that your computer’s hard drive had full-disk encryption enabled. That’s the kind of peace of mind that encryption can offer. Without your master password, you could hand over your hard drive to a would-be thief and rest easy knowing that should they decide to snoop around your hard-drive, all they would be met with is unintelligible gobbledygook.

Continue reading