Submit Hint Search The Forums LinksStatsPollsHeadlinesRSS
14,000 hints and counting!


Click here to return to the 'a note of caution' hint
The following comments are owned by whoever posted them. This site is not responsible for what they say.
a note of caution
Authored by: GerryA on Jul 24, '02 06:21:08PM

This is a really useful hint, and one that I've been waiting on for a long time! BUT.. a note of caution: that file also contains your hardware address (in an Appletalk field buried in there somewhere). I don't know what would happen if you transferred this file to a new machine which used both a modem connection AND was hooked up to the internet (my iBook is hooked into the internet at work, but to the modem at home)... some (maybe even all?) local networks require the computer's hardware address for the purposes of assigning an IP number. I know almost nothing about this. I just know that I have to find this number for each new machine I get, and pass it on to the network people before I get given an IP number for the new machine. Anyone have any information on this? Maybe it doesn't matter, or maybe the system somehow overwrites the hardware information dynamically (after all, it had to get into that file in the first place..). Just my tuppence worth (a quaint British expression..!).



[ Reply to This | # ]
Re: a note of caution
Authored by: hayne on Jul 25, '02 02:01:57AM

[I]some (maybe even all?) local networks require the computer's hardware address for the purposes of assigning an IP number. I know almost nothing about this. I just know that I have to find this number for each new machine I get, and pass it on to the network people before I get given an IP number for the new machine. [/I]

This is something that the corporate network administrators often do in order to keep more control of the network. By configuring their routers etc with your MAC (hardware) address, they can prevent any other computer (e.g. a laptop brought in from outside) being used on the network. But it is possible to spoof your MAC address (i.e. to make it seem that your machine has some other MAC address) so this only stops the less capable intruders. This is not something that is necessary - the ARP protocols allow for automatic discovery of the MAC address that matches an IP address.



[ Reply to This | # ]