Skip to main content

MAC



Two MAC are declared below :-
1.   A MAC is an address of a device which stands for media access control address. It is a uniquely identified address assigned to a network interface controller (NIC) for communications at the data link layer of a network segment. MAC addresses are used as a network address by many IEEE 802 network technologies, including EthernetWi-Fi and Bluetooth. A network node may have multiple NICs where each NIC contains a unique MAC address. They are used in the medium access control protocol sublayer.
MAC addresses are represented as six groups of two hexadecimal digits, separated by hyphens, colons, or no separator.
A MAC address is also known as burned-in address (BIA), Ethernet hardware address (EHA), hardware address or physical address.
MAC addresses are assigned by the manufacturer of a NIC and are stored in its hardware, like ROM or some other firmware mechanism. A manufacturer's organizationally unique identifier (OUI) may be contained in MAC address.
The US National Security Agency has a system to track the movements of everyone in the city by monitoring the MAC addresses of their electronic devices. By knowing that the users being trackable by their devices' MAC addresses, Apple has started using random MAC addresses in their iOS line of devices while scanning for networks. Many vendors quickly followed MAC address randomization for scanning by adding in Android version 6.0, Windows 10, and Linux kernel 3.18.

2.   The Macintosh branded as Mac since 1998 is a family of personal computers designed, manufactured, and sold by Apple Inc. since January 1984. The original Macintosh was the first mass-market personal computer that featured a GUI, built-in screen and mouse. Macintosh systems still found success in education, desktop publishing. It kept Apple as the second-largest PC manufacturer for the next decade.
Mac
Apple has developed a series of Macintosh operating systems. They are :- 
a)  Mac OS 7.6 in 1997  
b)  Mac OS X (UNIX Based OS) in 2001       
c)  Mac OS in 2016
d)  macOS Mojave in 2018
 Apple does not license mac OS for use on non-Apple computers but Only one company, UMAX Technologies was legally licensed to ship clones running Mac OS 8.



Comments

Popular posts from this blog

Nagware

Nagware is a software utility that adds users into upgrading or buying a premium version of software by sending constant pop-up messages or notifications.   It is a marketing tactic used by software developers in order to remind users to take advantage of special offers and purchase software. Nagware is also known as begware , annoyware , nagscreen and guiltware . It is built into commercial software that periodically prompts the user to register the product. Nagware is commonly used with  shareware  programs which have been downloaded for trial use. It keeps the message up for a certain time period, forcing the user to continue using the program. 

Atanasoff - Berry Computer ( ABC )

The Atanasoff – Berry Computer (ABC)   was the first electronic computer, designed and built by Lowa State College Mathematics and Physics professor John Vincent Atanasoff and his assistant, Clifford E. Berry ( a graduate student) . They worked in the basement of the physics building at Lowa State College on the computer from 1939 until 1942 when it was abandoned due to World War II . Unfortunately, after being abandoned , it was neglected and eventually disassembled for parts. In 1994, a team from Lowa state University began to rebuild the computer, finishing it in 1997. The system weighed more than seven hundred pounds (320 kg). It contained approximately 1-mile (1.6 km) of wire, 280 dual-triode vacuum tubes, 31  thyratrons , and was about the size of a desk.  The idea behind the ABC were later used in the construction of the ENIAC, the world’s first general purpose computer. Purpose / Working ABC was designed only to solve systems of  linear equations  and was succ

Virus

Virus  A virus is a computer code or program, which is capable of affecting your computer data badly by corrupting or destroying them. Computer virus has the tendency to make its duplicate copies at a swift pace, and also spread it across every folder and damage the data of your computer system. A computer virus is a malicious software program or "malware" which, when infecting your system, replicates itself by modifying other computer programs and inserting its own code. Types Of Virus :- File Infector Virus Multipartite Virus Resident Virus Boot Virus Macro Viruss Overwrite Virus Web Scripting Virus Impact of Virus :- Disrupts the normal functionality of respective computer system. Disrupts system network use. Modifies configuration setting of the system. Destructs data. Disrupts computer network resources. Destructs of confidential data. Infected computer programs may include data files, or even the "boot" sector of the hard dr