Tech Support Forum banner
Status
Not open for further replies.
1 - 11 of 11 Posts

·
Registered
Joined
·
49 Posts
maybe

Not sure but SOUNDS like spoofing a computer mac address to conceal one's identity. Common in times where someone has a wireless device and attempts to connect to an unsecure wireless network.

ie. using a fake name so no one will know who you are.
 

·
Registered
Joined
·
7 Posts
Discussion Starter · #3 ·
Thx 4 the info,
A m8 of mine is having problems on his comp and has mentioned something about mac spoofing being the problem, also he has mentioned port scan, could you give me some info on that?
 

·
Registered
Joined
·
49 Posts
Port Scan

A port scan is usually when someone has obtained your IP address and is scanning all ports from that address to see if there are any which are open. Some of these ports also provide information about your computer (ie. port 137,139). Usually a port scan is run on machines for malicious reasons.
 

·
Registered
Joined
·
49 Posts
firewall

A firewall can be constructed and setup with rules to block these ports. Be aware that these rules are mainly customized and be sure you do not block anything you need access to.
 
1 - 11 of 11 Posts
Status
Not open for further replies.
Top