Posts

What is the mac address

What is the MAC address and how to protect it

What is the MAC address?

The full name of a MAC Address is Media Access Control Address. It is also sometimes referred to as LAN Address, Ethernet Address, or physical Address.

A MAC Address is a flash memory chip that is burned in a Network Interface Card when produced by the Network equipment manufacturer.

In the OSI model, the network layer at layer 3 is responsible for IP addresses, and the data link layer at layer 2 is responsible for MAC addresses.

The MAC address identifies a unique network adapter on a network. If a device has one or more network adapters, each network adapter must have a unique MAC address. Therefore, the MAC address is used to identify the location of the network device.What is the mac address

 

How does MAC address work?

Data packet transmission is a process in which packets on the network start from the initial point, constantly map the address of the target node to the MAC address of the intermediate node, and then start from the intermediate node until the final target node is found.

Let’s have a further look at this process.

According to the address of the target node, the initial node maps the IP address of the target node to the MAC address of the intermediate node to find the first intermediate node.

And then starts from the first intermediate nodes according to the IP address of the destination node map to the MAC address of the second intermediate node, so as to find the second intermediate node.

After the last intermediate node is found, the packets are mapped from the last intermediate node to the MAC address of the destination node according to the address of the destination node.

The packets will be sent to the target host through this process.

IP addresses and MAC addresses are associated by using the ARP(Address Resolution Protocol). ARP assigns network IP addresses to devices with corresponding MAC addresses. The switch can find the MAC address of the local device based on the IP address in the network.

When the data packet reaches the switch, the switch will see the destination IP address of the data packet and check whether there is a MAC address corresponding to the IP address in the machine.

If the MAC address record is found, the data packet will be forwarded to the device with the corresponding MAC address. If no MAC address corresponding to the IP address is found on the switch, the switch will forward the destination to the device with the corresponding MAC address based on ARP.

The MAC address cannot be stolen

Today, many users use LAN to group hosts together and then connect to the Internet through intermediate devices such as switches or routers.

Because of the large number of hosts in the LAN, the need to distinguish between devices arises when uploading and recycling data. At the same time, there is also a growing need to prevent IP address theft.

IP addresses are only logical identifiers that can be changed by anyone, so they cannot be used as a specific factor in identifying a device. But MAC addresses can do because it is solidified in the network card inside and is immutable.

The IP address is related to the MAC address. The MAC serves as the identity card to prove the identity.

So in theory, unless the network card is stolen, otherwise it cannot be counterfeited. Based on the characteristics of the MAC address, the LAN selects the MAC address to identify specific users.

The mac address cannot be stolen

In the process of communication, the MAC address and IP address are mapped one by one through the switch or router. When a packet is sent to a host on the LAN, the switch will receive the packet first and maps the IP address in the packet into a MAC address according to the switching table, and then the packet will be forwarded to the host with the corresponding MAC address.

In this way, even if a host steals the IP address, if the host does not have the corresponding MAC address, the packet will not be received. And the anti-theft mode of sending process and receiving process is the same.

 

Differences between a MAC address and an IP address

Both IP and MAC addresses are unique. However, IP addresses are equivalent to home addresses, while MAC addresses are equivalent to identity cards. So they’re different in some ways:

  • The IP address can change, but the MAC address generally remains the same.

For a device on the network, such as a computer or a router, its IP address is assigned. On the same device or computer, it is easy to change the IP address, and users can easily obtain an IP address.

The MAC address, on the other hand, is written into the hardware by the manufacturer and generally cannot be changed. We can assign any IP address to a host or change the IP address as needed, but network devices (such as network adapters and routers) will have a MAC address once produced, and its MAC address cannot be changed by the configuration in the local connection.

But if something unexpected happens, for example, the computer network card is damaged, then after replacing the network card, the MAC address of the computer will also change.

  • The length is different.

The IP address is 32 bits, and the MAC address is 48 bits (6 bytes). The value is usually 12 hexadecimal numbers. Every two hexadecimal numbers are separated by colons, for example, 08:00:20:0a: 8C: 6D.

  • The distribution is different.

MAC addresses are assigned by the manufacturer, and IP addresses are assigned based on the network topology.

  • The protocol layer is different.

IP addresses are applied to OSI Layer 3 (network layer), while MAC addresses are applied to OSI Layer 2 (data link layer).

The network layer protocol transfers data from one network to another, and the data link layer protocol transfers data from one node to another on the same link by MAC address.

 

MAC Address Conflict

What is a MAC conflict?

The uniqueness and immutability of MAC addresses have been described in the previous section. In this case, the MAC address cannot be repeated.

However, some netizens reported that they had encountered MAC address conflicts and were unable to access the Internet.

It means that two same MAC addresses were encountered when the packet was returned. In this case, MAC address theft occurs. This is caused by an ARP virus attack or a malicious attack. Your MAC address has been taken by a machine.Virus attacks

 

How to find my MAC address?

  • Windows

First, press and hold down the “Start +R” keys on the keyboard.

Then enter “CMD” in the dialog box that is displayed.

Enter “ipconfig /all” in the command prompt window and press “Enter”. (The “ipconfig” command is to view the IP configuration information, and the parameter “all” indicates to view the configuration information of all net cards.)

The “physical address” is the MAC address.

  • Os

Open the system preferences panel.

Select “Network”, and tap “Advanced”.

Switching to the hardware panel to view the line of MAC addresses.

How do I protect the MAC address?

  • Binding a MAC address to a switch port is an effective defense.

However, only smart switches have the function of binding MAC addresses to ports. The widespread use of these devices is also expensive, so only a few people will spend a lot of money replacing their network equipment to avoid MAC address theft.

And binding port will also bring great inconvenience to the network management. The change of computer location will bring about the change of a port binding record, which increases a lot of management workload.

  • When MAC address conflict occurs, you can use MAC address spoofing to enable your device to continue to access the Internet.

However, this way is not recommended. Because any changes you make can mess up the whole process of sending and receiving data, causing the router to stop recognizing your device, making the problem even worse.

The MAC address you change may be the same as that of other users, causing others to lose access to the Internet.

  • Try to use VPN and Clon browser. Nip it in the bud and protect your MAC address from the start.

VPN can encrypt all your activities to prevent malicious attacks and the Clon browser is a product to protect your privacy. It can also provide you with high-quality privacy services so that your business and personal activities can become more secure.

IP addresses allow the Internet to find you

Why Two Computers Have The Same IP Address

What is an IP address?

The IP address is a uniform address format provided by the IP protocol. It assigns a logical address to each network and user’s computer on the Internet to mask the differences in physical addresses. It is also known as an Internet protocol address.

IP protocol is a protocol designed for computer networks to communicate with each other.

The most important part of the IP protocol is that every computer and other devices on the Internet is assigned a unique IP address. This unique address only ensures that users can select the objects they need efficiently and conveniently from thousands of computers when operating on a networked computer.IP addresses allow the Internet to find you

The history of IP address

The first IP address to appear is IPV4, which has only four digits, each with a maximum of 255.

Due to the rapid development of the Internet, the demand of IP address is increasing, which makes the distribution of IP address more and more strict.

On November 25, 2019, all of the world’s IPv4 addresses were allocated, and the lack of address space hindered the further development of the Internet. To expand the address space, the IPv6 address space is to be redefined. IPv6 uses a 128-bit address length.

IP address assignment

TCP/IP requires different Settings for different networks, and each node generally requires an IP address, a subnet mask, and a default gateway.

However, the Dynamic Host Configuration Protocol (DHCP) can be used to automatically assign an IP address to the client, which can avoid errors and simplify TCP/IP Settings. DHCP is a LAN protocol. The server controls a range of IP addresses under this protocol. When a client logs in to the server, the client automatically obtains the IP address and subnet mask assigned by the server.

 

Types of IP addresses

  • Private address: A Private IP address is an IP address used on a LOCAL area network (LAN). Private indicates that the IP address is exclusive. It is a private network address and an unregistered address. Only people or devices on your LAN can see your IP address. Some organizations or communities use these IP addresses.

What is LAN?

The coverage of LAN is generally within a few thousand meters. It is a local area network formed in the local area. LAN is characterized by convenience, cost-saving, convenient expansion, but the distribution area is limited.

A LAN can be as large as a connection between one building and its neighbors, or as small as a connection between offices.

Compared with other networks, the transmission speed of LAN is faster, the performance is more stable, and the framework is simple. Many organizations choose to use it because of its closed nature.

A LAN is a private network located in or near a building, such as a home, office, or factory. They are widely used to connect personal computers and consumer electronic devices, allowing them to share resources and exchange information. When LANs are used by companies, they are called enterprise networks.

  • Public address: A Public IP address is related to the entire Internet because it is an IP address used on the Internet. The public IP address is the equivalent of your home address, which allows the Internet to see you and send messages to you. You use an IP address every time you do something on the Internet, which can be deciphered by people using the Internet.public address and private address

 

Dynamic IP addresses VS Static IP addresses?

  • Dynamic IP: IP addresses are assigned only when needed.

Dynamic means that every time you go online, you are randomly assigned an IP address.

Internet users’ online time and space are discrete, therefore, it is not advisable to assign a fixed IP address (static IP address) to each user, which will cause a great waste of IP address resources. Because IP addresses are precious, most users use dynamic IP addresses to access the Internet.

For example, a computer that accesses the Internet through Modem, ISDN, ADSL, wired broadband, or cell broadband is assigned an IP address each time it accesses the Internet.

The local service provider buys a large number of IP addresses and automatically assigns them to users. When an IP address is no longer used by a user, it is reclaimed to the IP address pool for other users.

Dynamic IP addresses are cheaper than Static IP and provide security to users to some extent. Changing IP addresses make it impossible for malicious behavior to target your device.

 

  • Static IP: It is an IP address assigned to a computer or network device over a long period of time. Users use this IP address every time when they access the Internet.

Static IP is an IP segment that can be directly connected to the Internet. The IP address will be assigned to you when the ISP installs it so that the computers will no longer automatically obtain the network address when they connect to the network, avoiding trouble on the network connection.

Broadband carriers provide users with an IP address, subnet mask, gateway, and DNS server address. In the absence of a router, all you need to do is connect the home network cable to the computer and manually set the IP address on the computer so that the computer can access the Internet. Static IP addresses do not change and are mainly used for web applications or services on the Internet.

Some gamers and people who use VOIP also tend to use static IP addresses because it makes communication easier. Static IP addresses provide more reliable data transmission and faster exchange of information, but they are less secure and easier to track. Generally speaking, only special servers or computers with dedicated Internet access have fixed IP addresses, and this needs to be more expensive.

 

How do I find out if I am using a static IP or a dynamic IP?

  1. Click “Start” to open the command prompt, and search for “CMD“, and then click cmd.exe

  2. Enter “ipconfig/alI” in the command prompt window, and press Enter

  3. Locate the Ethernet Local Connection list. Find the “IP Address” line, which will give you the currently assigned IP address. Next, look at the “DHCP Enabled” line in the same section. If  “DHCPEnabled” is set to “Yes“, it means you have a dynamic IP address. If “DHCP Enabled” is set to “No“, that means you are using a static IP address now.

 

IP Address Conflict

Why does IP conflict occur?

Have you ever encountered the following situation?

When you are working on the Internet, your computer suddenly detects an IP address conflict. There is another computer on the network with the same IP address as yours. Then your computer stops working?

In fact, the IP addresses of devices such as computers and mobile phones are automatically assigned by the router. In general, under the DHCP adjustment, the router in normal operation will select the IP addresses to be used from the IP address pool, and the IP addresses in use are not in the alternative pool. Therefore, the router will not select the used IP addresses. So unless the router is down, conflicts are rare.

However, if two or more devices are configured with the same IP address and subnet mask, IP address conflicts may occur. This kind of situation generally happens in LAN.Two devices with the same IP address fight each other

 

How to resolve IP address conflicts?

  • Restart: Attempts to restart the computer and wait for it to retrieve a new IP address. If it still doesn’t work, continue with the following steps.
  • Change the IP address manually: Go to the control panel ➡ Access the network and sharing center ➡Click “Change Settings‘” ➡ Right-click “WLAN” or “Internet“➡ select “Properties“➡ Double-click “Internet Protocol“➡Change the IP address you want

  • Enabling the ARP Firewall: IP address conflicts may also be caused by ARP virus attacks. ARP attacks usually prompt IP address conflicts or even break down the network. First, check and kill the virus, and then installARP a firewall to open an active defense.

 

Clon Browser

IP addresses can be used to track user location information, so the security of IP addresses is closely related to user privacy and Internet security. In the face of privacy exposure and malicious attacks, a proxy can effectively protect your privacy. Clon Browser works closely with many proxy agents (Such as Luminati, Oxylabs, etc.), Clon Browser’s proxy integration service provides you with strong IP protection.

For more information about IP protection, please click here.

Use proxy IP technology

How to protect your IP address

The part of our daily Internet that easily exposes personal privacy is the public IP of our computer.

Track location by IP

What user privacy will be leaked by IP?

IP can be used to track our location information. Identify people through location (geographical location) and equipment (mobile phone, computer, etc.) and through time correlation analysis.
To put it simply, it is possible to use IP tracking to obtain that a person accessed the Google website through a computer at an address in New York, USA at 14:30 today.

The problem is coming?

  • How to use technology to protect our IP from being tracked?
  • How to protect your online privacy from being detected by people with ulterior motives?

Here are several relatively effective solutions to protect your IP privacy.

Why is it relatively effective? Because the technologies themselves are advancing with each other, there is no absolutely safe technology.
Technology itself is a race.

1. Use VPN to protect your IP

This is the most common way and the simplest to operate.

Use VPN to protect your IP

First, let me explain what a VPN is.

VPN full name: Virtual Private Network

VPN is defined as the establishment of a temporary and secure connection through the Internet, which is a safe and stable tunnel through a chaotic public network. Using this tunnel, data can be encrypted several times to achieve the purpose of using the Internet safely, which is widely used in corporate offices.

The virtual private network can also be an extension of the corporate intranet. Virtual private networks can help remote users, company branches, business partners, and suppliers establish reliable and secure connections with the company’s intranet, and are used to cost-effectively connect to business partners and users’ secure extranet virtual private networks.

Therefore, many office workers also need to establish a VPN connection on their own computers to facilitate remote office work and so on.

Turn on the VPN on the device we want to surf the Internet and connect to the VPN network, so that our public network IP will be turned into an exit IP of the VPN network.

The export IP of VPN may be anywhere in the world.

In this way, an American user IP can use VPN to become a Japanese export IP.
The cracker will always see the export IP of the VPN, thus protecting our IP.

2. Use proxy IP technology

Use proxy IP technology

A proxy server is also called proxy IP, its function is to proxy network users to obtain network information.

To put it vividly: it is a transfer station for network information.

The proxy server is like a big Cache, which can significantly improve browsing speed and efficiency.

More importantly: Proxy Server is an important security function provided by Internet link-level gateways.

The main functions are:

  • Breaking through its own IP access restrictionsnetwork users can access the target website through the proxy IP, The proxy IP can be in any country, thus breaking through the blockade of certain target websites for specific regions.
  • To improve the access speedusually, the proxy server sets a larger hard disk buffer.  When external information passes through, it also saves it in the buffer.  When other users access the same information again, the buffer is directly used.  Take out the information from it and pass it to the user to improve the access speed.
  • Hiding the real IPInternet users can hide their IPs through this method to protect their privacy from attacks.

But what I want to remind here is that proxy IP is actually divided into the hidden proxy, anonymous proxy, and transparent proxy. Only by using high anonymity proxy IP can the real IP address be completely hidden.

  • Using a transparent proxy IP, the other party can see the proxy IP you use and your real IP.
  • Using an anonymous proxy IP, the other party knows that you have used the proxy IP and cannot directly see your real IP address, but you can still see it through some means.
  • Using high hidden proxy IP, you can completely hide the real IP address.

3. Combine the springboard network

The first two daily-used technical solutions can simply protect the IP privacy of the target website. But if the other party is a hacker with ulterior motives and has certain public rights. We need to use a more professional springboard network.

The springboard network generally implements the complexity of the entire link tracking through a huge multi-node agent network. Springboard network has features such as update and maintenance cycle change, zero logs, etc., which can further protect users.

For example, TOR (software that provides springboard network services) server does not record logs, but third-party servers cannot control it.

However, the mechanism of TOR is to update the link every ten minutes, so the real IP cannot be traced under the current human computing power.

The record of ISP depends on the laws of each country.

For example, in Romania, Ceausescu used the Typewriter Act in history, which caused serious harm to the country.

Therefore, the citizens attach great importance to privacy protection. The log records of domestic ISPs are not mandatory, but customer information is required to be protected. Therefore, most service providers do not record them. VPN service providers that claim to protect privacy will recommend users to use Romanian servers because there is no need to log logs there. But in fact, no country will track an IP across the border. This has political issues.

Regarding the springboard network, it has gone beyond the scope of our IP privacy protection. Our daily scenarios are for fair services (different services of certain target websites to regions) and fast and effective network access. Oppose some illegal privacy tracking and protect your online identity instead of sabotaging and attacking.

Method of shielding ip

Method of shielding ip

What is IP?

IP: Internet Protocol, IP address is a string of numbers and decimal points, used to identify each device connected to the Internet. There are two types: IPv4– composed of four two or three digits (for example: 123.45.67.89), separated by a period. IPv6–address is much longer, including letters and numbers separated by colons. Compared with IPv4, IPv6 has higher routing and data flow efficiency and higher security.

Everyone’s IP address is unique. Every time you visit a website, you will provide your real IP address to the website. In addition, the IP address can easily infer the user’s specific location with high accuracy. Even if you are simply browsing, and nothing is done, revealing your location will be troublesome. In order to profit from your online behavior, websites and third-party advertisers can use this data to push specific content to you, guess what you like, and then push you more and guide you to make purchases.

For example, airlines and travel companies will change product prices based on the location of your IP address. So you may see a big change in airfare prices. Another example is the big data familiarization operations commonly used in various platforms. If you like privacy and don’t like censorship, you have to learn to hide your IP address. Another reason for hiding IP addresses is to bypass restrictions on websites, service providers, government agencies, workplaces, and even schools.

Do you know any good ways to hide your IP address?

Use VPN:fast,convenient and safe

VPN (Virtual Private Network) stands for virtual private network and is a software service. Simply put, encrypt all data through the VPN server and connect to the Internet in the country you want to assign a virtual IP address related to that country. Hide your real location.

Of course, when connecting to the VPN, you need to replace the IP address with the IP address of the connected network. At the same time, the VPN needs to provide information about you in order to track your device traffic (you can also find the IP address through DNS leaks), and it is available on the market The best VPNs need to pay a fee, but they are definitely value for money and very safe. You need to choose a reputable product that has advanced encryption and security profiles to prevent your real IP address from being leaked. Although there are free VPNs, their functions are limited, the speed will not be very fast, and there may be a risk of security threats caused by malicious attacks by other software.

Web proxy-slower and insecure

The working principle of a web proxy is almost the same as that of a VPN. The proxy is usually used to access geo-blocked content: after connecting to the proxy, all traffic starts to pass through the server, and your IP address will be hidden behind the IP address of the proxy server.

The difference between web proxy and VPN:

1.The proxy server is not encrypted

Even if your IP address is hidden by the proxy server when you use it, it can still be analyzed by providers and law enforcement agencies. In addition, some sites may use Flash or JavaScript to track your real IP address.

2.The speed will be slower

Some browsers only allow the proxy to use directed network traffic. You need to go to the browser settings and specify the IP address of the server. Applications and devices outside the browser (such as Skype) will display you Real IP address. In addition, if the proxy connection drops for some reason, your real IP may be exposed.

3.Tor-hide your IP address for free

Tor (The Onion Router) is a free software.It is a decentralized global anonymous network maintained by volunteers from all over the world. When you use it, your Internet communications will be encrypted and routed through a random sequence of these volunteer “nodes”, which are a bit like proxy servers. Traffic will pass through multiple servers, and after multiple encryptions, it is almost impossible for anyone to trace back to your IP address.

The disadvantage is that the speed is slow and not suitable for torrent or streaming media playback-insist on using web browsing, and it is usually related to criminal activities, it can visit dark web and illegal websites. Some websites block connections from known Tor nodes, and your ISP may not approve of its use. To achieve maximum privacy and security, it is recommended to use Tor and VPN in combination.

Public WiFi-high risk

IP addresses are freely allocated by Internet service providers. IP addresses are constantly being recycled to keep a limited number of available IP addresses. Your IP address may change from time to time. This is a dynamic IP. The IP address of a public place is a shared connection, so others cannot trace it back to you.

In the same way, public WiFi will make you more vulnerable to security threats such as hackers and malware.