E - electronic, in computer terms, it refers to anything which is online, anything which uses network.
AEGIS - in computer terms it refers to security, defence.
It’s a software used for security purpose.
The software does not allow to change the MAC Address of the PC.
2. What is E-AEGIS
• E - electronic, in computer terms, it refers to
anything which is online, anything which uses
network.
• AEGIS - in computer terms it refers to security,
defence.
• It’s a software used for security purpose.
• The software does not allow to change the
MAC Address of the PC.
3. About E-AEGIS
• This software is written in VB.net
programming language.
• Thus its written in VB.net it can be executed in
any windows platform like Windows 7,
Windows 10.
• A task in windows task scheduler is used to
trigger the application.
4. Importance of MAC Address
• The MAC address is a unique value associated
with a network adapter. MAC addresses are
also known as hardware addresses
or physical addresses. They uniquely identify
an adapter on a LAN.
• MAC addresses are 12-digit hexadecimal
numbers (48 bits in length).
5. MAC spoofing
• MAC spoofing is a technique for changing a factory-
assigned Media Access Control (MAC) address of a
network interface on a networked device.
• The MAC address that is hard-coded on a network
interface controller (NIC) cannot be changed.
• However, many drivers allow the MAC address to be
changed. Additionally, there are tools which can make
an operating system believe that the NIC has the MAC
address of a user's choosing.
• The process of masking a MAC address is known as
MAC spoofing.
6. Purpose of changing MAC Address
• Free Internet: There are places where you go get the WIFI
password but can’t access the network because they have
activated MAC filtering so spoof your MAC to allowed
devices and have fun.
• Identity Protection: As I told you it’s your identity on the
network so you can protect your identity on that network.
• Stop Tracking: Now in the world of WIFI zones companies
try to keep track of users by recording the MAC address so
spoofing MAC randomly can save you from that as well.
• Fake Accounts: By changing MAC ID we can easy create
fake accounts
7. Windows Task Scheduler
The Task Scheduler is a tool included with
Windows that allows predefined actions to be
automatically executed whenever a certain set
of conditions is met.
For example:-
You can schedule a task to run a backup
script every night, or send you an e-mail
whenever a certain system event occurs.
8. About the software
• This software can be implemented in corporate
industries where there is a cyber security threat arisen
by there employee because, the first step for doing
illegal activities with computer is Spoofing the MAC
Address.
• If the employee changes the MAC Address the system
will trigger an action and the computer will restart until
the MAC Address is changed on the PC and it will give 2
minutes time interval to change the MAC Address on
the system. To find the MAC address on the computer,
Internet is must without internet MAC Address can’t be
fetched, without internet this software will not trigger
the process.
9. The software has 3 parts:
1. MAC Address finder
2. MAC Address comparison
3. Task Scheduler Process
MAC Address finder:
This part is used to find the MAC Address of the system.
MAC Address comparison:
This part is used to compare the MAC Address given in the
program with the current MAC Address.
Task Scheduler Process:
This part is used to invoke the application with the help of
windows task scheduler.
10. Working process
• When a user changes the MAC Address of a
system it will be automatically logoff.
• With the help of Windows task scheduler the
process will run the software constantly when
the user logon to the system.
• At first the task scheduler will start the
execution then the application will start the
finding and comparison part.
11. • If the current MAC Address matches with the
default MAC Address it will simply terminate
the process.
• If the current MAC Address does not matches
with the default MAC Address it will logoff the
system.
12. This is the designing part of the software but it will
not be visible during the software execution.
Screenshot
13. This is task created in the windows task
scheduler for triggering the process when the
user is logged on.
14. Advantage
To find the MAC Address we need the internet,
in that case during the execution of the
software without internet means the system
will be logoff, but in my software the process
will be triggered only if internet is present
otherwise the action will not be triggered.
15. CONCLUSION
The E-AEGIS is security purpose created
software by this the cyber crimes and illegal
activities can be reduced as the software
needs the administrator privilege the other
persons can’t manipulate the software (or) the
task created in the task scheduler.
16. FUTURE ENHANCEMENT
If the administrator wants to change the MAC
Address it can changed (or) declared in the
VB.net program. Only the administrator can
able to change the MAC Address directly in
the software.
So the future enhancement will be the MAC
Address can be manually changed by the
administrator directly in the software itself.