All about my IP address and MAC address

In modern computer technology, IP address is a fascinating product that aims at allowing one digital device or computer to communicate with other through the internet. With the help of IP addresses location of nearly billions of system and digital devices connected to the Internet can be differentiated from other computers or devices. Remote computers require your IP address for communicating with your system. The term IP in IP address means Internet Protocol. IP is a set of rules governing activities of internet as well as facilitating completion of varying actions on WWW (World Wide Web). Hence, IP address basically is a part of systematically laid interconnected grid governing online communication via identifying different Internet destinations as well as IP address and MAC addressinitiating devices hence establishing 2-way communication. There are 4 numbers in IP address each containing 3 digits and all four numbers can be separated from one another via single dot. The range of 4 numbers will be between 0 and 255. IP address can be dynamic or static where static never changes whereas dynamic can be changed.

With IP address there is hardware address as well. It is typically tied to key connection device called NIC (Network Interface Card) in your system.NIC essentially is system circuit card making it possible for system of yours to connect to network. Each NIC will have hardware address called Media Access Control, in short MAC address. As IP address is related to TCP/IP hence MAC address is associated to network adapter’s hardware. It is hard-coded or hardwired on network interface card of the system and will be unique. It is Address Resolution Protocol or ARP that translates IP address into MAC address. ARP acts like passport taking data from IP address via actual piece of your system hardware.

Address Resolution Protocol is protocol utilised by IP especially IPv4 for mapping Internet Protocol network address to hardware addresses that data link protocol make use of. It is protocol operating below network layer as part of interface between OSI link layer and OSI network layer. Address resolution means process of finding address of some computer in network. Address will be resolved using protocol using which piece of information will be sent by client process that is executing on local system to server process that is executing on remote system. Information obtained by server will allow server to identify uniquely the network computer for which address was needed and hence for providing required address. Procedure of address resolution will be completed when client receives response from server containing needed address. Four kinds of ARP messages are there that can be sent via ARP protocol and these are RARP reply, RARP request, ARP reply, and ARP request.

Let us see how Address Resolution Protocol works. When trying to ping some IP address on a local network, the system is required to turn IP address into MAC address. It involves ARP usage for resolving address. Computer will keep look-up table for ARP where it will be storing information about all IP addresses that are related with particular MAC address. While trying sending a packet to IP address, system would first consult that look-up table for seeing if it already knows MAC address. In case the value has been cached, ARP will not be used. In case ARP isn’t found in ARP look-up table, system would be sending broadcast packet to network by making use of ARP protocol. As it is a broadcast packet, it is sent to special MAC address causing all machines on network to access it. Machine that has requested IP address would reply with ARP packet and it would include MAC address as well that can obtain packets for that particular IP.

Those who can access system would find MAC address by making use of ip addr Is or ifconfig commands. This would not help those who are in remote locations and accidently have given same IP address to 2 machines. As already mentioned, ARP allows host to find MAC address of the node with IP address on same physical network on being provided with the IP address of the node. For making ARP efficient, every system caches the IP to MAC address mappings for eliminating repeated ARP broadcasting requests made. With the help of ARP tool users can view as well as modify entries of ARP table on local system. ARP command will be useful if you want to view ARP cache as well as resolve address resolution issues.

There is a wide range of tools available for changing MAC address as well as IP address and two popular tools are given below:

Change MAC address – It is a spoofing tool for MAC address. In firmware of network adapter chip, each network adapter will have change mac addressunique MAC address that is embedded by the manufacturer. At times one may require finding out or changing MAC address of network adapter primarily if used for the internet access authentication. This tool allows you to spoof MAC address easily just with few clicks wherein users would be capable of changing their MAC addresses. While the process is going on, it is possible selecting varying manufacturer or generating entirely random MAC address. Some features of this tool are given below:

  • Set MAC address without change of manufacturer
  • Set MAC address of some other manufacturer
  • Generate entirely random MAC address
  • Replace MAC address with other address
  • Show manufacturer of network adapter
  • Show MAC address of network adapter
  • Automatically activate new MAC address post change

My IP Hider – This tool allows users to enjoy private and anonymous web surfing. It offers protection and security at Wi-Fi hotspots placed publicly. This tool can be used on Mac, Android, iOs, and Windows. It will hide ip address of your system from hacker and snoopers. Every time when users connect to some hotspot, they will get new proxy ip address and their actual ip address would be hidden from outside world hence offering complete protection from cyber criminals. This IP Hiding software will replace your actual IP address with one that belongs to its own servers.

my IP Hider

Leave a Comment

Filed under Security and Privacy

Six good habits to keep your PC safe

Security and safety of your system is certainly something that one has to deal with all the time. For covering all the security areas, it is best to keep anti-virus of your system updated as well as keep strong passwords for all online accounts. These passwords should be changed on regular basis. However, there are some other good habits given below that one can have for keeping their PC safe.

1.Maintain backup of all data- Backing up data will assist you in protecting in events of electric outage, computer crash, or surge likebackup-files the one produced by lightning storm. This would also help in case one falls prey to new kind of ransomware that encrypts sensitive data of yours. Back-up of all important documents can be done manually to external hard drive or by making use of different services available online.

2.Deals that are unbelievably good though they cannot be true should be avoided. Suppose one gets to see a deal for 90 percent off on The Beatles Collection CD, definitely it should be knocked-off. There are even worse situations wherein customers would be lured with amazing deals and post they’ve entered credit card information of theirs, they’ll never hear from deal providers ever again. Here your identity can be compromised. Hence, one should avoid such luring deals, offers, and sites.

3.Opening unknown emails must be avoided- emails from suspicious or unknown sources should never be opened. Definitely one should never open even those attachments that are there in it. One has to be alert regarding such emails. Even the emails that are coming from known person if appears suspicious must be avoided primarily if account of the sender is hacked. In case email from people with whom you are regularly communicating contains unusual content and suspicious link, it should be deleted as well as the person must be alerted immediately as her account could have been hacked. In this way one would prevent phishing scams and hacking attacks.

4.Regularly check firewall- for Windows-based system, firewall is available in search box. If the firewall is connected or on then it is fine. Mac users should click Apple icon on their toolbar and browse to system preferences-> security-> firewall. Ensure having 6-Tips-For-Keeping-Your-PC-Safefirewall in place as it will assist you in a long way when it comes to protecting your system from internet threats.

5.Be cautious of Rogue sites- it can be tough to spot rogue site but few things are there that one can do for honing their skills. Search for green lock in address bar especially when accessing webmail or entering credit card details. Clicks sent to email shouldn’t be clicked.

6.Sensitive information must be kept sensitive- irrespective of which site one is using while revealing sensitive information be careful. Information like credit card details or social security number should be used with trusted sites only. One has to be especially careful when using social networking sites. If you are revealing information like mother’s maiden name or pet name then it could lead to various identity thefts especially when you are using similar data as security question for other sites.

Leave a Comment

Filed under Security and Privacy