I want to know something about mac spoofing or mac cloning.
we offer trial on our hotspot and when a guest tries network it can use internet for 30 minutes and after it he changes mac address and then can use it again, it is a one case, many pirates try to get access to the registered user via changing mac address , is their any solution of this?
is their any way to block the pirates? what's the best solution?