With Instructables you can share what you make with the world, and tap into an ever-growing community of creative experts.
Tell us about yourself!
Jason, CEO/Lead Engineer JNETechnologies. FMR--USAF Special Operations Command at A.F. Information Warfare Center FL, NV.. Simply put, I assign a =<0.0 value to any "Trace" objectives. If attempting to spoof BIG BROTHER, know this value. Mac ID Properties Emulation and Manipulation (MIPEN), my pen, abilities would NEVER exist if we did not conceive it. Further, I heard a story, from a guy, went like this: Iraq was enriching an element via centrifugal methods. There was a software CDD. This PCUI directly accessed and modulated a DCM which had had it's and 3217 of it's partner's MAC ID modified. Guess what? Found first round. Then deployit.exe. I can untangle ANY EMI's at will with a single (GOV) snap-in.FYI
deployit.exe took a whopping 512K on a FD. In other words, do not attempt to spoof through ANY government or, especially military port. As similar to below, it is now considered a rudimentary layer of our .GOV firewalls. Only one way, physically. TM have to a
Please make my job cooler. Stop sneaking through our GOV encryption layers and then up and leave. What the hell. Do you simply need to know? At least try to copy or modify any part of our network/data. Then I can have some fun....read below.
HERE WE GO.... OK. Readers, know that even each PC, TV, PDA....is produced using a vast number of comprising pieces of hardware, each having it's own unique MacID. This makes conclusive ID even easier and without doubt. Do the math If x=number of MacID's within a, say, laptop, a low end would be x=(x)x2. Do the math. figure 100 ID's internally. Now x=100x100x100. 100x100=10000. So, 10000x10000=100,000,000. Now, account for appx. 350(x), an iPad. From mic. to cam., to, touch sense, to, Bluetooth adaptor.... that is the ONLY device on earth containing these exact groupings of device MacID's.Try a VWAN. Tweek at least PC MacID. Proceed to create say 40 VM's on your VWAN. Tweek Location Services, PC Time and map out 38 hops in route. The more Mac's you tweek the better. BUT!!! DO NOT MESS WITH THE TIER 5 GOV AGENCIES!!! We introduced MIPEM before creating algorithms to deal with this paradox of variables with regards to Trace Identification Protocol. TIP. read beloy and then again below... TY.J
Join 2 million + to receive instant DIY inspiration in your inbox.
Download our apps!
© 2016 Autodesk, Inc.