Please register to participate in our discussions with 2 million other members - it's free and quick! Some forums can only be seen by registered members. After you create your account, you'll be able to customize options and access all our 15,000 new posts/day with fewer ads.
I'm a bit computer challenged and don't understand why a hacker's address couldn't be traced.
Although my network is password protected, I don't think anyone would want to hack into my "wireless dial up." (Even the MAC people didn't believe I use dial up with a wireless connection.)
It's not really a hacker - I'm on a mac too. You know how when you open up the wireless connection on your mac you can find open wireless connections? that's all that the potential hacker has to do. And then when they trace to an address, it's tracing to your IP address, because they are using your internet connection.
If you are are dial up - even wireless dial up - I don't think you have to worry (I have to admit though - I've never heard of wireless dial up...)
Don't forget WarDriving. This is where hackers, teenagers, script-kiddies and simply people in cars, drive around searching for an open wireless connection. Use to be back in the day, hackers and gamers would mark a yellow X on the street, so others would know where the open network was. Now, they are using GPS technology to track it. WiGLE - Wireless Geographic Logging Engine - Plotting WiFi on Maps or StumbVerter. They even have methods to triangulate between Open WiFi and Cell phone towers to ensure the best signal strength while using your WiFi on their cell/pda.
Here's some things that you can do to REDUCE your risk. Nothing... and I mean NOTHING is ever 100% secure.
Change the default administrator id and password
DO NOT auto-connect to open networks
Turn on WPA/WEP encryption
Enable Mac Address filtering
Disable SSID broadcasting
Assign static ip addresses to devices
Enable firewalls on devices
Change your default SSID
Turn off your router when not in use for a while (like when you go on vacation)
I could have used my neighbors wireless signal for free if I wanted to (The Conrad Mt. Police Dept.) But I told them their signal was unsecured and the fixed that right away. I am content with dial up that I pay for. There may not be a law against poaching wifi in my state yet but it is illegal in some states, Florida comes to mind, but even if it's legal where you live it is dishonest in my opinion.
I, in fact, picked up a cell modem to avoid having this problem on my own. Often I am at clients who have no internet access for one reason or another - having my own on my person solves the problem of having to surf for an unsecured wifi in order to be able to do my day to day work.
The simple way - WEP key and WPA aside - is to create an access control list. there should be an option somewhere that says "Allow / Deny" and what you want is to add your connected computer to the list, and set it to the "Allow" - denying all others.
Here's some things that you can do to REDUCE your risk. Nothing... and I mean NOTHING is ever 100% secure.
Not everyone who borrows a connection is a hacker, cracker, or looking to grab your data. Sometimes, people just need a quick network connection.
My wifi setup is completely open access. Anyone can connect, but the first time they do that session, they have to accept a statement on a web page before access is granted - basically saying I'm being friendly by leaving this out there, don't abuse it. I record MAC addresses, client info, etc, and will ban anyone abusing the connection. Otherwise, have fun.
My network is heartily secured, as all connections are routed through one of my linux boxes, which acts as an AP. I also have a network bridge, and another WAP I'm setting up outside (for laptop action on a cool summer day, in an easy chair - pfft like I'll ever have that kind of time).
Not everyone who borrows a connection is a hacker, cracker, or looking to grab your data. Sometimes, people just need a quick network connection.
My wifi setup is completely open access. Anyone can connect, but the first time they do that session, they have to accept a statement on a web page before access is granted - basically saying I'm being friendly by leaving this out there, don't abuse it. I record MAC addresses, client info, etc, and will ban anyone abusing the connection. Otherwise, have fun.
My network is heartily secured, as all connections are routed through one of my linux boxes, which acts as an AP. I also have a network bridge, and another WAP I'm setting up outside (for laptop action on a cool summer day, in an easy chair - pfft like I'll ever have that kind of time).
No worries.
Now that is a really good idea.
Please register to post and access all features of our very popular forum. It is free and quick. Over $68,000 in prizes has already been given out to active posters on our forum. Additional giveaways are planned.
Detailed information about all U.S. cities, counties, and zip codes on our site: City-data.com.