- The user's network card MAC address is used as a base for the last group of GUID digits
- Using GUID, a document can be tracked back to the computer that created it
- This privacy hole was used when locating the creator of the Melissa worm
- Most of the other digits are based on the time while generating the GUID.
- GUIDs which contain a MAC address and time can be identified by the digit "1" in the first position of the third group of digits, for example
Have fun with GUID :)
No comments:
Post a Comment