Prev: Are You Looking for Affordable VOIP?
Next: T-Mobile to put Wi-Fi calling on Android phones in summer?
From: Mike Easter on 13 May 2010 16:23 MikeD wrote: > They leave it open and then try to cut people off based on Windoze USER > NAME, HOSTNAME and MAC address. They obviously have no idea what the > hell they are doing since I can readily change all three within 5 > minutes. Gateway keeps sending me ICMP to determine who I am, but that > keeps changing; I'm back again. Possibly a honeytrap. If so, hope they > like worthless information, that's all they are getting. > Do you think you should be using that access point? It seems pretty clear that they don't want you to. You have no way of knowing or understanding why they are so configured and managed. Just because you are able to defeat some kind of security or insecurity doesn't mean you should. -- Mike Easter
From: Bert Hyman on 13 May 2010 17:10 In news:hshomp$e89$1(a)speranza.aioe.org potsee <potsee(a)hotmail.com> wrote: > If they leave their door wide open, they are inviting him in. That's the attitude of someone who's up to no good. Just because I'm not taking active measures to keep you out does not in any way mean that I've "invited" you in; I'm simply expecting you to act in a civilized manner. -- Bert Hyman St. Paul, MN bert(a)iphouse.com
From: Jeff Liebermann on 13 May 2010 18:13 On Thu, 13 May 2010 19:56:04 +0000 (UTC), MikeD <MikeD(a)gmail.com> wrote: >They leave it open and then try to cut people off based on Windoze USER >NAME, HOSTNAME and MAC address. They obviously have no idea what the >hell they are doing since I can readily change all three within 5 >minutes. Gateway keeps sending me ICMP to determine who I am, but that >keeps changing; I'm back again. Possibly a honeytrap. If so, hope they >like worthless information, that's all they are getting. Locally, some hospital and corporate Wi-Fi systems work that way. You need to have a VPN client, with all the requisite authentication, in order to get anywhere on the system. You can probably connect to the wireless access points, but that's all you get. There's no wi-fi encryption in use because the VPN provides all the encryption and security that's needed. Don't have too much fun beating your head against the firewall. -- # Jeff Liebermann 150 Felker St #D Santa Cruz CA 95060 # 831-336-2558 # http://802.11junk.com jeffl(a)cruzio.com # http://www.LearnByDestroying.com AE6KS
From: Bill Kearney on 14 May 2010 20:18
> If they leave their door wide open, they are inviting him in. > Maybe they are snoops trying to get personal information for ID theft? Yup, leave it open and then scan all the packets looking for IDs and passwords. Doesn't take long. |