in reply to Re: Add Hash Key Based on Matching Another Key
in thread Add Hash Key Based on Matching Another Key
Thanks zek152. In this case, we're using the burned in MAC of an Access Point, something that's not easily spoofed. Spoofing the MAC of a Linksys router and/or a client laptop wired/wireless is certainly trivial.
Regards,
|
|---|