From: Wayne C. Morris on 3 Mar 2005 16:14 In article <mrydnVFICqfm3rrfRVn-pQ(a)speakeasy.net>, russotto(a)grace.speakeasy.net (Matthew Russotto) wrote: > In article <020320051709062339%cfnzrpu(a)crevtrr.arg>, > J. Stewart <cfnzrpu(a)crevtrr.arg> wrote: > > > >You are responsible for the traffic in both directions via your > >connection, telling the judge someone "borrowed" it isn't going to help > >much. > > Actually, it very well might. You are not necessarily responsible for > the traffic going through your connection. However, you're certainly > going to be the first suspect. And proving that you're not responsible could be stressful, time-consuming, and expensive.
From: Geoffrey F. Green on 3 Mar 2005 16:26 In article <tph-11E6B6.10433403032005(a)localhost>, Tom Harrington <tph(a)pcisys.no.spam.dammit.net> wrote: > In article <112ehnm28ugrb5a(a)corp.supernews.com>, > "G.T." <getnews1(a)dslextreme.com> wrote: > > > "Matthew Russotto" <russotto(a)grace.speakeasy.net> wrote in message > > news:WPCdnWtAmfZK37rfRVn-qA(a)speakeasy.net... > > > In article <geoff-usenet2-8E4033.15534602032005(a)comcast.dca.giganews.com>, > > > Geoffrey F. Green <geoff-usenet2(a)stuebegreen.com> wrote: > > > >In article <marc.heusser-03ADB0.19495402032005(a)idnews.unizh.ch>, > > > > Marc Heusser <marc.heusser(a)CHEERSheusser.comMERCIALSPAMMERS.invalid> > > > > wrote: > > > > > > > >Although if the issue is just unauthorized folks glomming onto his > > > >network, it's much better than nothing. Particularly in a > > > >multiple-unit building like where I live; there are several open > > > >wireless networks broadcasting SSIDs, so anyone who wants to join a > > > >network would access one of the others before trying to crack my WEP > > > >encryption. > > > > > > Putting WEP on your network is like putting a bathroom-type privacy > > > lock on your front door. It lets people know the door's locked, and > > > will keep them from blundering in accidentally, but that's about it. > > > > > > > I'm sorry but it's stronger than that. Nobody is going to bother cracking a > > WEP-protected home network. Bathroom-type locks have one key that is fairly > > easy to find. > > That might be, but it's only because there are so many home networks > that don't even have WEP on. It's not hard for someone to crack WEP if > they want to, but there's no sense bothering if they can get the same > result without the effort. WEP doesn't make a predator lose interest, > it just helps you to not be the slowest deer in the herd. That's precisely my point. If you want to keep random folks from easy jumping onto your network, WEP will do fine. It won't keep determined folks out, but I wouldn't be surprised if it kept the OP's borrowers off his network. - geoff
From: Carl Witthoft on 3 Mar 2005 16:52 In article <mcmurtri-607F10.21554802032005(a)corp-radius.supernews.com>, Kevin McMurtrie <mcmurtri(a)dslextreme.com> wrote: > In article <carl-5697A8.17451102032005(a)comcast.dca.giganews.com>, > Carl Witthoft <carl(a)witthoft.com> wrote: > > > Only one other responder has mentioned that it's quite possible that no > > outside person is connecting whatsoever. > > First of all, it's highly unlikely that someone else is carefully only > > connecting when the OP is not logged on, so all he has to do is search > > his network neighborhood (or equivalent) for other addresses online. > > > > Next, all routers "chat" continuously with the modem to send or respond > > to connectivity queries from the ISP source. Blinking LEDs are in no > > way exclusively an indicator of traffic from another user. > > Routers send maybe 5 packets every 5-60 minutes for ARP. That hardly > keeps the lights blinking. My router and my cable modem blink on and off at about 2Hz. YMMV
From: G.T. on 3 Mar 2005 21:03 "Tom Harrington" <tph(a)pcisys.no.spam.dammit.net> wrote in message news:tph-11E6B6.10433403032005(a)localhost... > In article <112ehnm28ugrb5a(a)corp.supernews.com>, > "G.T." <getnews1(a)dslextreme.com> wrote: > > > "Matthew Russotto" <russotto(a)grace.speakeasy.net> wrote in message > > news:WPCdnWtAmfZK37rfRVn-qA(a)speakeasy.net... > > > In article <geoff-usenet2-8E4033.15534602032005(a)comcast.dca.giganews.com>, > > > Geoffrey F. Green <geoff-usenet2(a)stuebegreen.com> wrote: > > > >In article <marc.heusser-03ADB0.19495402032005(a)idnews.unizh.ch>, > > > > Marc Heusser <marc.heusser(a)CHEERSheusser.comMERCIALSPAMMERS.invalid> > > > > wrote: > > > > > > > >Although if the issue is just unauthorized folks glomming onto his > > > >network, it's much better than nothing. Particularly in a > > > >multiple-unit building like where I live; there are several open > > > >wireless networks broadcasting SSIDs, so anyone who wants to join a > > > >network would access one of the others before trying to crack my WEP > > > >encryption. > > > > > > Putting WEP on your network is like putting a bathroom-type privacy > > > lock on your front door. It lets people know the door's locked, and > > > will keep them from blundering in accidentally, but that's about it. > > > > > > > I'm sorry but it's stronger than that. Nobody is going to bother cracking a > > WEP-protected home network. Bathroom-type locks have one key that is fairly > > easy to find. > > That might be, but it's only because there are so many home networks > that don't even have WEP on. It's not hard for someone to crack WEP if > they want to, but there's no sense bothering if they can get the same > result without the effort. You need traffic. If someone wants to crack my WEP in 2 weeks so be it. I'll still detect them because I only allow 2 192.168.1.x IPs out through my firewall. I see one of the 2 IPs is being used and my WEP key gets changed. Greg -- "destroy your safe and happy lives before it is too late, the battles we fought were long and hard, just not to be consumed by rock n' roll" - the mekons
From: G.T. on 4 Mar 2005 01:18
"Michael Vilain" <vilain(a)spamcop.net> wrote in message news:vilain-05C647.21375103032005(a)news.comcast.giganews.com... > In article <112fgknfre38ha0(a)corp.supernews.com>, > "G.T." <getnews1(a)dslextreme.com> wrote: > > > "Tom Harrington" <tph(a)pcisys.no.spam.dammit.net> wrote in message > > news:tph-11E6B6.10433403032005(a)localhost... > > > In article <112ehnm28ugrb5a(a)corp.supernews.com>, > > > "G.T." <getnews1(a)dslextreme.com> wrote: > > > > > > > "Matthew Russotto" <russotto(a)grace.speakeasy.net> wrote in message > > > > news:WPCdnWtAmfZK37rfRVn-qA(a)speakeasy.net... > > > > > In article > > <geoff-usenet2-8E4033.15534602032005(a)comcast.dca.giganews.com>, > > > > > Geoffrey F. Green <geoff-usenet2(a)stuebegreen.com> wrote: > > > > > >In article <marc.heusser-03ADB0.19495402032005(a)idnews.unizh.ch>, > > > > > > Marc Heusser <marc.heusser(a)CHEERSheusser.comMERCIALSPAMMERS.invalid> > > > > > > wrote: > > > > > > > > > > > >Although if the issue is just unauthorized folks glomming onto his > > > > > >network, it's much better than nothing. Particularly in a > > > > > >multiple-unit building like where I live; there are several open > > > > > >wireless networks broadcasting SSIDs, so anyone who wants to join a > > > > > >network would access one of the others before trying to crack my WEP > > > > > >encryption. > > > > > > > > > > Putting WEP on your network is like putting a bathroom-type privacy > > > > > lock on your front door. It lets people know the door's locked, and > > > > > will keep them from blundering in accidentally, but that's about it. > > > > > > > > > > > > > I'm sorry but it's stronger than that. Nobody is going to bother > > cracking a > > > > WEP-protected home network. Bathroom-type locks have one key that is > > fairly > > > > easy to find. > > > > > > That might be, but it's only because there are so many home networks > > > that don't even have WEP on. It's not hard for someone to crack WEP if > > > they want to, but there's no sense bothering if they can get the same > > > result without the effort. > > > > You need traffic. If someone wants to crack my WEP in 2 weeks so be it. > > I'll still detect them because I only allow 2 192.168.1.x IPs out through my > > firewall. I see one of the 2 IPs is being used and my WEP key gets changed. > > > > Greg > > But in order to break the encryption, all they need to do is sniff the > packets passively. They don't need to sign-on to your network. Once > they have the encryption key, all traffic is in the open. Hope you only > deal with SSL web sites when providing information as the unencrypted > packets are broadcast to anyone listening who's got your encryption key. > Totally untraceable. > How long do they need to passively sniff my few megabits a day to crack my WEP key? How many opportunities are there between my router and the destination site to sniff my communications? How many Windows and IE users have keystroke loggers downloaded to their systems everyday due to stealth malware? Cable networks were WAY less secure than my home wireless network, don't know if they still are. I'll take my chances with my current setup. Greg -- "destroy your safe and happy lives before it is too late, the battles we fought were long and hard, just not to be consumed by rock n' roll" - the mekons |