Skip to main content

Posts

Showing posts with the label network visualization

Network Attributes of your computer

Contents 1 MAC Address 1.1 Linux 1.2 Windows 1.3 Mac OS 2 802.11 "nickname" 2.1 Linux 2.2 Mac OS 2.3 Windows 3 DHCP Properties 3.1 Linux 3.2 Windows 3.3 Mac OS 4 IP Address 4.1 Proxy Hopping 4.2 SSH Hopping 4.3 OpenVPN 4.3.1 Windows 4.3.2 Mac OS 4.3.3 Linux 4.4 Tor 4.5 I2P 4.6 SLIRP 5 Double Black Magic IP Wizardry 5.1 Tor followed by HTTP Proxy 5.2 Tor followed by SSH-tunneled SOCKS4 Proxy 5.3 OpenVPN over Tor or HTTP Proxy 5.4 SLiRP over Tor or HTTP Proxy 5.5 SLiRP over SSH hopping (and Tor) MAC Address Every 802.x network card (wireless, ethernet, token ring) has a unique 48 bit identifier known as a MAC address. This address is burned into the EEPROM on the card, and oftentimes is used by networking equipment to track users as they come and go, frequently associating MAC address to hotel or dorm room #, credit card number, login info, etc. This means hopping on a network that