Thanks zek152. In this case, we're using the burned in MAC of an Access Point, something that's not easily spoofed. Spoofing the MAC of a Linksys router and/or a client laptop wired/wireless is certainly trivial.
Regards,In reply to Re^2: Add Hash Key Based on Matching Another Key
by spickles
in thread Add Hash Key Based on Matching Another Key
by spickles
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |