woodstock
Final Approach
look out! first, the laptop, and just today we set up the wireless. I have no limits now. well, no limits beyond my own property and your local starbucks anyway.
woodstock said:look out! first, the laptop, and just today we set up the wireless. I have no limits now. well, no limits beyond my own property and your local starbucks anyway.
woodstock said:look out! first, the laptop, and just today we set up the wireless. I have no limits now. well, no limits beyond my own property and your local starbucks anyway.
Missa said:Uh, please set set your own limit... the bathroom is a place the laptop should never go.
Missa
Ed Guthrie said:Stuff they don't teach you:
1. Change your SSID from "wireless" to something not so obvious.
2. Turn SSID broadcast off (router).
3. Set an encryption.
4. If possible, place the router below ground (basement).
#1 combined with #2 makes you fairly safe from drive by hackers. #3 will make the system nearly safe. #4 makes it virtually hack proof unless the hacker is inside the house.
Ed Guthrie said:Stuff they don't teach you:
1. Change your SSID from "wireless" to something not so obvious.
2. Turn SSID broadcast off (router).
3. Set an encryption.
4. If possible, place the router below ground (basement).
#1 combined with #2 makes you fairly safe from drive by hackers. #3 will make the system nearly safe. #4 makes it virtually hack proof unless the hacker is inside the house.
This raises a question I've been wanting to ask you guys. I was staying at my Dad's house for a few days and took my laptop. I was able to get connected from his neighbor's router. Are there any rules/laws that prohibit using your wireless computer to connect from someone else's router?woodstock said:... just today we set up the wireless. I have no limits now. well, no limits beyond my own property and your local starbucks anyway.
N2212R said:You have no idea how many posts I've made on here from there. LOL
Technically, yes, you've just violated federal wiretapping laws. It happens quite a bit, though, and I doubt anyone would prosecute if they even noticed.Diana said:This raises a question I've been wanting to ask you guys. I was staying at my Dad's house for a few days and took my laptop. I was able to get connected from his neighbor's router. Are there any rules/laws that prohibit using your wireless computer to connect from someone else's router?
Missa said:Remind me never to touch your laptop.
N2212R said:**puts on black spandex body suit**
**puts on wire rimmed glasses**
**slicks hair back**
**speaks with german accent**
"Vood you like to touch my laptop?"
ARGH! Foiled again!Let'sgoflying! said:Never take your laptop into the bathroom! Don't you know there are people with software that can turn your screen into a camera - they can see everything! (The program reverse-charges the monitor's photo-tube DC current for only a fraction of the time so you don't notice, and turns it into wide-aperature still-camera lens.. then it transmits the images of your household, covertly, back to the hacker's computer.)
N2212R said:You have no idea how many posts I've made on here from there. LOL
Brian Austin said:Technically, yes, you've just violated federal wiretapping laws. It happens quite a bit, though, and I doubt anyone would prosecute if they even noticed.
Carol said:How would they notice?
NickDBrennan said:Number one way, at least number one way for me to notice, would be to see a drop in available bandwidth.
NickDBrennan said:Number one way, at least number one way for me to notice, would be to see a drop in available bandwidth. I'd do some snooping and see that another computer was connected to my network.
Reverse hacks are still subject to electronic hacking laws. Once upon a time, companies used to have active retaliation systems that would launch an attack against someone who was attacking them. Can't do that. With zombies, it's pointless anyway.NickDBrennan said:How that turns to prosecution, I know not, but I do know that computer is fair game now. There are rare times I put my skills to bad use, but in case of attempted hacks or bandwidth theft, I pull no punches.
NickDBrennan said:Number one way, at least number one way for me to notice, would be to see a drop in available bandwidth. I'd do some snooping and see that another computer was connected to my network.
How that turns to prosecution, I know not, but I do know that computer is fair game now. There are rare times I put my skills to bad use, but in case of attempted hacks or bandwidth theft, I pull no punches.
You'd notice the car?Carol said:I guess what I meant was, how would I know? There are the prescribed safeguards in place here but if there were not, how would I be able to tell that someone parked at the curb was using my bandwidth?
Carol said:I guess what I meant was, how would I know? There are the prescribed safeguards in place here but if there were not, how would I be able to tell that someone parked at the curb was using my bandwidth?
Carol said:I guess what I meant was, how would I know? There are the prescribed safeguards in place here but if there were not, how would I be able to tell that someone parked at the curb was using my bandwidth?
lancefisher said:And on the flip side, with all the legal hotspots around how would a squatter know they were using a site illegally if they didn't have to hack their way in. I think you could make a pretty strong case that any open WAP is fair game and that only ones that had at least enabled encryption were protected by the law from "unautorized" use.
N2212R said:You set up your router to notify you when anyone connects to it.
Originally Posted by N2212R
You set up your router to notify you when anyone connects to it.
Carol said:Okay, thanks.
You're simply not going to find this kind of stuff on home use equipment. The average user isn't going to understand what to do with the info anyway. And define "unauthorized use"? What if your brother/sister stays for a few days and wants to connect his/her laptop to your network? Authorized, sure. But you have to tell the router, too.Let'sgoflying! said:let me know if you figure out how.
I did not see an option, "Send email to ______ if unauthorized use occurs" in the software. No such switch on the hardware either. (Motorola here)
Brian Austin said:You're simply not going to find this kind of stuff on home use equipment.
Let'sgoflying! said:Quote:
Originally Posted by Brian Austin
You're simply not going to find this kind of stuff on home use equipment.
I didn't think so. Thanks Brian. Home users are stuck being 'wide open'.
Time out. You misinterpreted, I think.Let'sgoflying! said:I didn't think so. Thanks Brian. Home users are stuck being 'wide open'.
Linksys is now owned by Cisco. Your unit was one of the first ones with the Cisco input in design. It should be fine. I've installed a few lately.woodstock said:btw, mine is a Linksys WRT54GS
so far so good!
Ed Guthrie said:Not true on either count. My Netgear router (WGT634U) traps MAC addresses until the next reboot. IOW, I can view the MAC address of every PC that connected at any time since the last router power on. Look for a router control page titled "Attached devices" or equivalent.
Ed, how many users do you know who actively review their router logs? The implied scenario here was "have the router TELL me" when an unauthorized user accesses the router. If the average user doesn't even know what a MAC address is, what are they supposed to do with the info? And, honestly, what good does it do you to see that 0E:45:20:9B:EF:39 connected to your router 10 days ago?Ed Guthrie said:Not true on either count. My Netgear router (WGT634U) traps MAC addresses until the next reboot. IOW, I can view the MAC address of every PC that connected at any time since the last router power on. Look for a router control page titled "Attached devices" or equivalent.
Brian Austin said:I suspect your router actually tells you DHCP served addresses, not MAC connections.
Ed Guthrie said:I realize you were talking about immediate notification, which is great if you have a 24-hour admin and you want to take active steps to repel boarders, but the access log is good if you merely want to monitor the effectiveness of your router settings. I started out rather lax with my router settings, but when I noticed that I was the ISP of choice in my neighborhood I started taking a few appropriate security measures.
woodstock said:I was surprised to see how many people in my hood have unlocked wireless routers. when you first set it up and it starts looking around for networks and there were a ton here, and at least 4 of them were wide open.
lancefisher said:That's not uncommon. Most people treat it like a toaster, plug it in and it works.Originally Posted by woodstock
I was surprised to see how many people in my hood have unlocked wireless routers. when you first set it up and it starts looking around for networks and there were a ton here, and at least 4 of them were wide open.
you're kidding right? maybe in the movies.Never take your laptop into the bathroom! Don't you know there are people with software that can turn your screen into a camera - they can see everything! (The program reverse-charges the monitor's photo-tube DC current for only a fraction of the time so you don't notice, and turns it into wide-aperature still-camera lens.. then it transmits the images of your household, covertly, back to the hacker's computer.)