The MAC Address of the device will be used along with an algorithm. If someone is clever enough to duplicate it then i can live live with it as other factors are taken into account additionally.W. H. Heydt wrote:You can, under program control, establish a connection between two machines. That's how things like PuTTY ssh, pscp and similar programs work. a somehwat larger question is...why? What are you going to do to prevent someone from modifying the Python code to eliminate the check and just act as if the authentication was good without doing it?
Users browsing this forum: ghans and 44 guests