| http://www.w3.org/ns/prov#value | - Although there are techniques such as MAC spoofing that could enable someone to disguise their attacking device as a permitted computer, MAC filtering is generally a good policy if you or a few others are the only ones that will be using using the specified network.
|