take file that block non-dos appliction reading the mac addres

Discussion in 'Ghost Security Suite (GSS)' started by tayasimggg, May 19, 2005.

Thread Status:
Not open for further replies.
  1. tayasimggg

    tayasimggg Registered Member

    Joined:
    May 3, 2005
    Posts:
    102
    Location:
    israel
    i know how to block non-dos appliction like Iexplorer reading the mac addres

    rename it form: Mac outside read protect.txt
    ----> Mac outside read protect.ghst
    and copy it to your C:\Program Files\RegDefend\groups
    you'r will gain one more level up in your privacy in the NET.
    (you have to be in regdefend 1.1 at list)
    file update19.5.05
    this is in addtion to the windows ID protction that i upload last week.
    if you can help to create more "privacy" !!
    and do respond this time to my file's

    enjoy fox!!
     

    Attached Files:

    Last edited: May 19, 2005
  2. tayasimggg

    tayasimggg Registered Member

    Joined:
    May 3, 2005
    Posts:
    102
    Location:
    israel
    blocking windows ID reading update 19.05.05

    rename it form: Windows ID.txt ----> Windows ID.ghst

    and copy it to your C:\Program Files\RegDefend\groups
    you'r will gain one more level up in your privacy in the NET.
    (you have to be in regdefend 1.2 at list)

    windows ID protction is to Windows ver - 2K/XP3(2bit)/2003(32bit)
    all service pack apply.

    enjoy fox!!
    :D
     

    Attached Files:

  3. fred22

    fred22 Registered Member

    Joined:
    Dec 6, 2004
    Posts:
    229
  4. Paranoid2000

    Paranoid2000 Registered Member

    Joined:
    May 2, 2004
    Posts:
    2,839
    Location:
    North West, United Kingdom
    Given that MAC addresses are not used on the Internet (only IP addresses are used to route traffic, MAC addresses are relevant to local area networks only), what exact privacy advantage do you expect from this?
     
  5. tayasimggg

    tayasimggg Registered Member

    Joined:
    May 3, 2005
    Posts:
    102
    Location:
    israel
    yes, firewall is a trusted appliction that you can give it your permission to read mac addres!
     
  6. tayasimggg

    tayasimggg Registered Member

    Joined:
    May 3, 2005
    Posts:
    102
    Location:
    israel
    mac can be read from you in the internet, if some ad-ware is allready installed on your pc.

    and in that case:
    "the big brother" can't see you if none of the applictions can't read your mac addres :ninja:
    "they" can't trace you if your ip is changing sometimes!!
     
    Last edited: May 20, 2005
  7. Paranoid2000

    Paranoid2000 Registered Member

    Joined:
    May 2, 2004
    Posts:
    2,839
    Location:
    North West, United Kingdom
    You can't be traced using your MAC address anyway. Your MAC address is not included in packets sent outside your local network (if you have a router, it will remove the part of the packet containing your network card's MAC address and replace it with its own MAC before forwarding packets onwards) and it is not included in any global registry like IP addresses are.

    The only likely "registry" of MAC addresses would be Microsoft's Windows Update and they would (a) have this data from any previous updates (b) have a number of other identifiers (including software licence keys) to match up against in the event of a changed/null MAC address.

    However most network cards can have their MAC address changed so anyone trying to collect and process such data would be on a fool's errand.
     
  8. tayasimggg

    tayasimggg Registered Member

    Joined:
    May 3, 2005
    Posts:
    102
    Location:
    israel
    listen you sound like a clever guy and i understand your point.
    but:
    i know some company that uses this method to mark you whan you use their appliction product. it is very famous company to.
    i have meet one of them, he was an administrator that work with me in the army in a secret base....bla bla bla bla.
    ok never mind, the main point is that they use your mac to know if it is realy you up ther that using their appliction.
    the proof is that - they use special technique to suppose for example block or nuke you they can specific user from entering ther web...... if them know is mac. and you cant came back even if you created a new user and change your ip and restore the registry.
    he told me that. and only because of my respect to hime i cant tell more.

    you dont have to believe me but this is what i know.

    so truh that mac is not a normal packet but.....
    the truth is out there
     
  9. tayasimggg

    tayasimggg Registered Member

    Joined:
    May 3, 2005
    Posts:
    102
    Location:
    israel
    i gave the Windows ID for fight it.... ;)
    and they still give you full update support after using the Windows ID.ghst
     
  10. Paranoid2000

    Paranoid2000 Registered Member

    Joined:
    May 2, 2004
    Posts:
    2,839
    Location:
    North West, United Kingdom
    Since the MAC address can be changed on most network cards, this seems a singularly unreliable means of authentication.
    You mean to say they store a cookie to identify whether you are a valid user or not. Well that's novel. :)

    The MAC address is held in the network card firmware and usually requires a special utility to change. This has had to be modifiable since some old network protocols required specific MAC addresses.
     
  11. tayasimggg

    tayasimggg Registered Member

    Joined:
    May 3, 2005
    Posts:
    102
    Location:
    israel
    look if ther is a chance that the mac can use agenst you even 3%.
    I just sugested that it be a good way to block it from none-dos appliction to have the mac. what is worng with it.
    and they realy use in that compeny the mac addres i know it.
    ok the end ​

    and i want to add that most users do not know how to change their mac address and like the Windows ID file "not having ID or Mac at all is more secur then change it sometimes"

    if you have a good idia for new ghst file to make or what to block, then tell me and i will work on it, then upload the file here and you will help me check.
    end everybody will enjoy from us.

    anyway thanks paranoid2000
     
  12. Paranoid2000

    Paranoid2000 Registered Member

    Joined:
    May 2, 2004
    Posts:
    2,839
    Location:
    North West, United Kingdom
    There are 2 issues - the first is that the MAC address will still be visible on any packets your PC sends out on an Ethernet network (the network card puts this regardless of Windows/DOS settings) so this doesn't stop tracking or tagging within your local network. So anyone with a valid concern over this would be better advised to change their MAC address using the appropriate network card utility - or keep changing cards.

    Secondly outside of a local network, the possibilities of authentication or tracking via a MAC address are almost nil. The company you mention may well be using MAC addresses within their own LAN (many universities do this for example to identify students' PCs) but for Internet access a user/password combination is really the only option.
    As far as MAC addresses go, registry restrictions can't really help. You may wish to check out application GUIDs or product registration keys (e.g. HKLM\SOFTWARE\Microsoft\Office\9.0\Registration\ProductID for Office 2000). Another option would be the UserAssist keys (if they're not already covered) which store details of your previous actions (see Yet Another Method Windows Uses to Log Your Computer Activity) - any program attempting to read these would likely qualify as spyware.
     
  13. tuatara

    tuatara Registered Member

    Joined:
    Apr 7, 2004
    Posts:
    777
    True, it works like this:
    If your application on your computer is reading your Ethernetcard(s) MAC-addres it can send that over the Internet and use it for authentication.
    You must understand that the Application on your computer can always read your MAC. and if the application is allowed by your firewall to connect to
    the Application makers Server (like an AV AntiSpyware etc.)
    It can check if the license-key is not used by 2 MAC addresses or
    isn't used on another computer.
    As you know the MAC-address contains a Vendor code etc. as well.
    So you know that it is a Sun Microsystems system, or a Apple or HP etc.
    If you combine this with other system information this can be usefull.

    On a Unix system like Solaris it is quitte easy to change your MAC address,
    but for some networkcards in your pc this is not possible.
    Another problem is that if you work in a larger LAN and 3th layer switches/routers are used it also is impossible to change your MAC otherwise
    you are dropped in a dead(vlan). (have no network access).

    The authentication on MAC on the Internet is just as old as the Internet itself.

    Example if Microsoft would implement that the license of your Windows version and your MAC adress where send over the Internet at every update (attempt) they could easaly find lots of people that are trying to use
    a network of pc's with one external IP and one License-key.

    And i agree on the fact that changing a MAC-address is not that simple
    for the avarage user.

    But to be honest, i am curious to know, which applications would react
    if i would change my computers Mac's.

    need to re-test this again (after all those years).

    :D
     
  14. tayasimggg

    tayasimggg Registered Member

    Joined:
    May 3, 2005
    Posts:
    102
    Location:
    israel
    if anyone know which process in windows useing for reading the mac, please give this information and i will find a way to paralyse it whit a rule from doing just that.

    something mast be use to communicate with the network card's.

    i have enough patience to keep fight it.
     
  15. tayasimggg

    tayasimggg Registered Member

    Joined:
    May 3, 2005
    Posts:
    102
    Location:
    israel
    what is it?? can you explain me more?
     
  16. tayasimggg

    tayasimggg Registered Member

    Joined:
    May 3, 2005
    Posts:
    102
    Location:
    israel
     
  17. tayasimggg

    tayasimggg Registered Member

    Joined:
    May 3, 2005
    Posts:
    102
    Location:
    israel

    i will take it for me as a project and i will made regdefender a ghst file that give you defend from reading the actions user doing in is personal PC.

    give time to research :rolleyes:
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.