U.S. CitiesCity-Data Forum Index
Go Back   City-Data Forum > General Forums > Science and Technology > Computers
 [Register]
Please register to participate in our discussions with 2 million other members - it's free and quick! Some forums can only be seen by registered members. After you create your account, you'll be able to customize options and access all our 15,000 new posts/day with fewer ads.
View detailed profile (Advanced) or search
site with Google Custom Search

Search Forums  (Advanced)
Reply Start New Thread
 
Old 07-01-2011, 02:19 PM
 
422 posts, read 652,398 times
Reputation: 143

Advertisements

Quote:
Originally Posted by Tek_Freek View Post
Like that's going to stop anyone...
There have been many arrests on the issue. I, for one, have a honeypot setup for when they do feel like stealing, they will know it immediately.
Reply With Quote Quick reply to this message

 
Old 07-01-2011, 02:26 PM
 
24,503 posts, read 35,974,381 times
Reputation: 12847
Quote:
Originally Posted by dougstech View Post
There have been many arrests on the issue. I, for one, have a honeypot setup for when they do feel like stealing, they will know it immediately.
It's difficult to find out who is stealing..... and the only way that the authorities will spend any time investigating is if there's some additional illegal activity going on. No one is going to investigate leechers browsing the web and checking email.
Reply With Quote Quick reply to this message
 
Old 07-01-2011, 03:18 PM
 
25,629 posts, read 30,975,177 times
Reputation: 23131
Ok hopefully one of you computer gurus will address this for me. I read thru the entire thread and don't see an answer.

I have my wireless router set up to Mac filter and use a secure password with WPA2-personal. Network discovery and file sharing is turned off. I also turn the router and cable modem off after each use.

How is it the you can spoof a Mac address when the wireless router will only accept each specific MAC add. that has been manually programed into its software. Plus each MAC has its own required password to access the wireless signal?

Wouldnt you have to actually have a physical MAC address along with its corresponding password?


I don't know just asking.
Reply With Quote Quick reply to this message
 
Old 07-01-2011, 03:55 PM
 
16,308 posts, read 25,268,988 times
Reputation: 8302
Quote:
Originally Posted by dougstech View Post
There have been many arrests on the issue. I, for one, have a honeypot setup for when they do feel like stealing, they will know it immediately.
Based on the number that likely do it, it is virtually none.

Truthfully the police have a lot more more worthy things to worry about than accessing someone's WiFi. And if not, their priorities are screwed up.
Reply With Quote Quick reply to this message
 
Old 07-01-2011, 03:58 PM
 
16,308 posts, read 25,268,988 times
Reputation: 8302
Quote:
Originally Posted by dougstech View Post
There have been many arrests on the issue. I, for one, have a honeypot setup for when they do feel like stealing, they will know it immediately.
So, you are baiting them with open WiFi. You capture their MAC address. Then what? You can now determine the manufacture of the wireless card they own, and that buys you exactly what?
Reply With Quote Quick reply to this message
 
Old 07-01-2011, 11:12 PM
 
422 posts, read 652,398 times
Reputation: 143
Quote:
Originally Posted by Asheville Native View Post
So, you are baiting them with open WiFi. You capture their MAC address. Then what? You can now determine the manufacture of the wireless card they own, and that buys you exactly what?
Do some research. Everything they do on my wifi connect becomes mine. Passwords, files...any and all data. Also, alot of them that have shared folders on their PC.
Reply With Quote Quick reply to this message
 
Old 07-01-2011, 11:36 PM
 
16,308 posts, read 25,268,988 times
Reputation: 8302
Quote:
Originally Posted by dougstech View Post
Do some research. Everything they do on my wifi connect becomes mine. Passwords, files...any and all data. Also, alot of them that have shared folders on their PC.
OK, then what, use their information you downloaded to commit a crime? So you also rely on them having shared folders, why bother, just use the hidden administrative shares (you are aware of those ain't ya ). I ain't a lawyer, but it sounds reasonable that when they connect to your network you can harvest their files, BUT what you do with that, from financial theft to harassment is not legal.

Are you going to take out the warrants to have them arrested, testify in court, providing evidence that will stand up in court, for what law enforcement and the courts probably rank right up there with jaywalking?
Reply With Quote Quick reply to this message
 
Old 07-02-2011, 12:14 AM
 
24,503 posts, read 35,974,381 times
Reputation: 12847
Quote:
Originally Posted by dougstech View Post
Do some research. Everything they do on my wifi connect becomes mine. Passwords, files...any and all data. Also, alot of them that have shared folders on their PC.
What good are knowing other people's passwords?
Reply With Quote Quick reply to this message
 
Old 07-02-2011, 03:02 AM
 
422 posts, read 652,398 times
Reputation: 143
Quote:
Originally Posted by Asheville Native View Post
OK, then what, use their information you downloaded to commit a crime? So you also rely on them having shared folders, why bother, just use the hidden administrative shares (you are aware of those ain't ya ). I ain't a lawyer, but it sounds reasonable that when they connect to your network you can harvest their files, BUT what you do with that, from financial theft to harassment is not legal.

Are you going to take out the warrants to have them arrested, testify in court, providing evidence that will stand up in court, for what law enforcement and the courts probably rank right up there with jaywalking?
There are some popular blogs out there where people post all the info their honeypot collects. If someone is stupid enough to connect illegally to another's wifi, any data they send over it may end up being published. And completely legal because the data belongs to the owner.
Reply With Quote Quick reply to this message
 
Old 07-02-2011, 11:51 AM
 
28,631 posts, read 40,609,166 times
Reputation: 37316
{Popping popcorn}
Reply With Quote Quick reply to this message
Please register to post and access all features of our very popular forum. It is free and quick. Over $68,000 in prizes has already been given out to active posters on our forum. Additional giveaways are planned.

Detailed information about all U.S. cities, counties, and zip codes on our site: City-data.com.


Reply
Please update this thread with any new information or opinions. This open thread is still read by thousands of people, so we encourage all additional points of view.

Quick Reply
Message:

Over $104,000 in prizes was already given out to active posters on our forum and additional giveaways are planned!

Go Back   City-Data Forum > General Forums > Science and Technology > Computers
Similar Threads
Follow City-Data.com founder on our Forum or

All times are GMT -6.

© 2005-2019, Advameg, Inc. · Please obey Forum Rules · Terms of Use and Privacy Policy · Bug Bounty

City-Data.com - Archive 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35 - Top