How can spoofing a certain MAC address enable sending probe requests that I was never connected to?

I was wondering how could my computer that uses a spoofed MAC address be sending probe requests for APs that I was never connected to?

Note:- The other computer with the original MAC address was shut down.

Continue reading How can spoofing a certain MAC address enable sending probe requests that I was never connected to?

How can spoofing a certain MAC address enable sending probe requests that I was never connected to?

I was wondering how could my computer that uses a spoofed MAC address be sending probe requests for APs that I was never connected to?

Note:- The other computer with the original MAC address was shut down.

Continue reading How can spoofing a certain MAC address enable sending probe requests that I was never connected to?