⚠️ Encyclopedia Dramatica is currently being restored by automated scripts ⚠️

There's been a lot of questions as to what's going on with the site and what comes next. So we have this (ordered) roadmap of what's being worked on and what's to come. This will be updated until the roadmap is complete as Æ has a lot of missing features and ideas that I'd like to fix in regards to its offerings before I implement big plans for the site's popularity and well-being in 2021.

Æ Roadmap

  • Content restoration (Mostly done, few things missing that will be restored sporadically)
  • Image restoration (Being run in background, nothing I can do cept wait)
  • Æ Imageboard (Currently being worked on)
  • Mediawiki upgrade and backend fixes
  • .onion domain for Tor-friendly editing and viewing
  • CSS overhaul (Fixing things like the videos on mobile, and overall a rehaul of the wiki's look to be more friendly to readers)
  • Paid bounty board for new articles (Won't be managed by me for legal reasons however I will ensure it runs smoothly)
  • Anonymous phone # service for those seeking ban evades from Twitter as well as a phone number not tied to their name (more details at launch)

  • Currently we are nearing our annual LLC renewal fee ($650) as well throwing the funds required for these other changes and aspects. If you would like to support Æ consider purchasing a copy of The Hustler's Bible or securing some Merch. Donating is also appreciated however I would rather give something back as per the two options above.

    If you have any questions you can join our public Telegram chat to DM me privately or @ me in chat.

    You can also email me via [email protected]

    Merch notes: Thank you to all who have purchased merch. We will ship late January or mid February depending on our provider's speed.

    Here's to setting the world on fire in 2021! - aediot



    MAC address

    From Encyclopedia Dramatica
    Jump to navigation Jump to search

    Contrary to popular belief among macfags, a "MAC address" has nothing to do with the shiny white plastic bricks that you see everywhere nowadays. It stands for "Media Access Control address" and is a unique identifier associated with a network adapter. More importantly, it can be spoofed for convenience, fun and profit.

    The IEEE 802 MAC address was originally created by a Scotchman, named Conchar McAddress. He implemented it in the original Xerox Ethernet addressing scheme. Because of him, this 48-bit address space contains potentially 2^48 or 281,474,976,710,656 possible MAC addresses.

    There are different types of MAC addresses. One for LAN, and one for WAN. (Remember, your ISP's router has a MAC address, too)

    Here is an example of it being used on a LAN:

    • Host 1 (192.168.1.1): Yo everyone on the LAN (FF:FF:FF:FF:FF:FF), who has the IP 192.168.1.2? My MAC is DE:AD:BE:EF:CA:FE so you can respond back to me.
    • Host 2 (192.168.1.2): Hello DE:AD:BE:EF:CA:FE, I have IP 192.168.1.2 and my MAC address is 12:34:56:78:90:12 so you can send your IP packets to me.

    How to see your LAN's MAC address'

    MAC address' are stored in a table called the address resolution table (ARP).

    To see the table (The MAC address will be in the format **:**:**:**:**:**):

    Windows:

    • Type {windows key} + r
    • Type "arp -a"
    • Hit enter.

    Linux:

    • Open terminal.
    • Enter command "arp"
    • Hit enter.

    Spoofing

    On-campus networks (i.e. residence halls/dorms or shared units in college) and some other private networks, track bandwidth usage not by IP address, but by MAC address. On campuses, these limits are typically between 1gb and 6gb a day (for off-campus traffic, U/D combined). By spoofing your MAC address, it resets your bandwidth total and you gain instant respect within the haxoring community, the equivalent of taking CS III (and passing with a C++ or better).

    With MAC Address Spoofing you can also:

    • Locally lock/freeze/DoS the network
    • Impersonate another user on the network. This has many advantages.
    • Avoid FBI (Read: Paranoia) security logs by changing it.

    How to Change Your LAN's MAC Address

    If you have a PC and you're too afraid of the terrifying black screen with white text or just too fucking lazy to take 10 minutes to learn how to use it, grab one of the MAC spoofers at the bottom. If you have actually taken CSIII on the other hand, follow these simple step-by-step instructions.

    Windows

    • Go to Start -> Run, type "regedt32" to start registry editor. Do not use "Regedit".
    • Go to "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\ Control\Class\{4D36E972-E325-11CE-BFC1-08002BE10318}".
    • Double click on it to expand the tree. The subkeys are 4-digit numbers, which represent particular network adapters.
    • You should see it starts with 0000, then 0001, 0002, 0003 and so on.
    • Find the interface you want by searching for the proper "DriverDesc" key.
    • Edit, or add, the string key "NetworkAddress" (has the data type "REG_SZ") to contain the new MAC address.
    • Disable then re-enable the network interface that you changed (or reboot the system).

    Linux

    If you have Linux: ifconfig <interface> hw <class> <address>.

    OR

    • ifconfig eth0 down hw ether xx:xx:xx:xx:xx:xx
    • ifconfig eth0 up
    • Note: Change (xx:xx:xx:xx:xx:xx to what you desire. Must be hexadecimal in value)
    • MAC addresses use hexadecimal values. Characters 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, a, b, c, d, e, and f are acceptable.
    • Protip: DEADBEEFCAFE is a valid MAC

    Uses

    Impersonation

    • Use your operating systems appropriate command to display the ARP table.
    e.g., Windows: arp -a
    
    • Select one that is not you (use ipconfig /all to get your local IP)
    • Change your MAC to theirs.
    • WIN!

    All this does is cause network breakdown, but it also allows you to send and receive data that goes to both computers. although hard and ineffective, you can gain access to information on their computer as it is transmitted.

    Free Hotel Internet

    A lot of hotels use MAC address filtering in their "pay to surf" schemes, so impersonating a user via MAC address spoofing will allow you to surf while the victim pays.

    Local Denial of Service

    Many WiFi routers will lock up if a client tries to connect with the same MAC as the router's BSSID. Idea: Do this at a public access point with many users.

    PROTIP

    If you spoof too often you will eventually catch the attention of your school's IT staff. If the techfags send you a formal email about bandwidth abuse, they know exactly what you're doing, although they will rarely state it outright. School's usually have the policy of never directly accusing a student of stealing bandwidth, so they will probably ask you something innocent like why you have 6-7 computers in the same room. Don't fuck it up by spoofing more than 3 times a day, dipshit, or you could end up losing your internets or even booted from res.

    See Also

    External Links

    MAC address is part of a series on Language & Communication
    Languages and DialectsGrammar, Punctuation, Spelling, Style, and UsageRhetorical StrategiesPoetryThe Politics of Language and CommunicationMediaVisual Rhetoric
    Click topics to expand
    HitlerPikachu.png