Maker Pro
Maker Pro

Stolen ipods, laptops etc.

K

krw

Jan 1, 1970
0
On Mon, 8 Jan 2007 09:26:36 -0500, krw <[email protected]> Gave us:

MassiveProng wrote:

Frank Raffaeli wrote:

[spam snipped]

From Whois registry:
Report SPAM complaints to:
Shea, Thomas
17 Louise Street
Canton, MA 02021
US


It was posted from a Comcast cable modem with a fixed address.

[email protected]

It STILL may have been bounced through that IP addy owner's wireless
system, and not be him that did it at all. Hard IP address doesn't
mean shit when you leave ports open, and are on a system that doesn't
manage or police such activity. Either before or after the fact.


If someone doesn't secure their network, they are still at fault.
Its simple enough to only allow specific MACs to pass through a wireless
router. When I was setting up my wireless network, someone was trying
to use it. I would let them for a couple minutes, then delete them from
the DHCP user's table. After shutting him down about a dozen times, I
just blocked his MAC and he hasn't been back online. After that, I
decided to just allow the four wireless points on the system access it,
by switching to white listing the desired MAC addresses.

It's pretty easy to get around MAC whitelisting since the MAC is
part of every packet. You really need encryption too. AFAIK even
that isn't perfect.

My wireless router is set up to not broadcast its SSID, has a MAC
whitelist (one entry), and encryption enabled.


Now, if only we could get the ADSL and Cable access providers to
instruct their customers of such practices before, during and after
each install.
Too difficult. I set up a friends laptop (Acer) and wireless
network. It took far too long to figure out what they (ComCast)
were doing with that box and I couldn't figure out how to convince
the software how to search for the proper network, so left it open.
When I get time I'll have to go back over and figure out what the
hell the Acer network software is doing. My ThinkPad was a piece
of cake to set up. It just knows where it is and how it's
connected (though the dialer is constantly popping up).


Boot his laptop with a recent Knoppix Live CD (or DVD), and I'd bet
that it brings up the wireless connection dialogs right after it
enters the desktop
gui.

How is that going to train WinBlows to do its thing?
 
M

Michael A. Terrell

Jan 1, 1970
0
MassiveProng said:
You can actually run Linux on that (it already does), and set its RF
Power higher, among other things.


I don't want higher power. If it was higher, more people would find
it. You can hack it, if you can't find it.

There was an article on it in one of the Linux mags about four years
(3.5?) ago when it was at the end of it MFG run and Cisco had just
bought them. Great router.


It is still being manufactured. I bought mine new a couple months
ago. $39 + tax. Compare that to the single port Cat5 Linksys BEFSR11
firewall/router I bought in 2000 for $150 +tax.

The Linksys WRT54G was on sale in both the Best Buy and Circuit City
ads in the Sunday newspaper.


--
Service to my country? Been there, Done that, and I've got my DD214 to
prove it.
Member of DAV #85.

Michael A. Terrell
Central Florida
 
M

MassiveProng

Jan 1, 1970
0
On Mon, 8 Jan 2007 09:26:36 -0500, krw <[email protected]> Gave us:

MassiveProng wrote:

Frank Raffaeli wrote:

[spam snipped]

From Whois registry:
Report SPAM complaints to:
Shea, Thomas
17 Louise Street
Canton, MA 02021
US


It was posted from a Comcast cable modem with a fixed address.

[email protected]

It STILL may have been bounced through that IP addy owner's wireless
system, and not be him that did it at all. Hard IP address doesn't
mean shit when you leave ports open, and are on a system that doesn't
manage or police such activity. Either before or after the fact.


If someone doesn't secure their network, they are still at fault.
Its simple enough to only allow specific MACs to pass through a wireless
router. When I was setting up my wireless network, someone was trying
to use it. I would let them for a couple minutes, then delete them from
the DHCP user's table. After shutting him down about a dozen times, I
just blocked his MAC and he hasn't been back online. After that, I
decided to just allow the four wireless points on the system access it,
by switching to white listing the desired MAC addresses.

It's pretty easy to get around MAC whitelisting since the MAC is
part of every packet. You really need encryption too. AFAIK even
that isn't perfect.

My wireless router is set up to not broadcast its SSID, has a MAC
whitelist (one entry), and encryption enabled.


Now, if only we could get the ADSL and Cable access providers to
instruct their customers of such practices before, during and after
each install.

Too difficult. I set up a friends laptop (Acer) and wireless
network. It took far too long to figure out what they (ComCast)
were doing with that box and I couldn't figure out how to convince
the software how to search for the proper network, so left it open.
When I get time I'll have to go back over and figure out what the
hell the Acer network software is doing. My ThinkPad was a piece
of cake to set up. It just knows where it is and how it's
connected (though the dialer is constantly popping up).


Boot his laptop with a recent Knoppix Live CD (or DVD), and I'd bet
that it brings up the wireless connection dialogs right after it
enters the desktop
gui.

How is that going to train WinBlows to do its thing?


Well, one could use a small hard drive based "configuration file"
which Knoppix allows. Though being a live CD and Linux, it does allow
a small file to be placed on a FAT volume. One could also open the
network configuration file that gets generated, and examine or store
it on the hard drive as well, and later use the info to complete or
direct the wind-that-blows setup. Knoppix is always cool on laptops
for things like passing time playing games not in windows while on a
plane, etc. Learning more OSes expands one's computing horizons, and
in this case, costs ya nothing.
 
M

MassiveProng

Jan 1, 1970
0
I don't want higher power. If it was higher, more people would find
it. You can hack it, if you can't find it.

If your router isn't set for open network access, nobody is gonna be
hacking it.

You did you a key long and oddly charactered enough to be considered
"strong" as passwords go, right?
It is still being manufactured. I bought mine new a couple months
ago. $39 + tax.

That doesn't mean anything. What is the date code on the serial
number label?
Compare that to the single port Cat5 Linksys BEFSR11
firewall/router I bought in 2000 for $150 +tax.

The Linksys WRT54G was on sale in both the Best Buy and Circuit City
ads in the Sunday newspaper.

Doesn't mean it is of recent make. When the article ran, Radio
Shack had a close out sale on their remaining units, and got 'em all
out, IIRC.

They were nearly $100 new, and RS had them at $69. Now, they are
like $39 where they can be found. Unless Cisco re-introduced them,
though that usually results in a model number differential.
 
M

Michael A. Terrell

Jan 1, 1970
0
MassiveProng said:
If your router isn't set for open network access, nobody is gonna be
hacking it.

You did you a key long and oddly charactered enough to be considered
"strong" as passwords go, right?


That doesn't mean anything. What is the date code on the serial
number label?


Doesn't mean it is of recent make. When the article ran, Radio
Shack had a close out sale on their remaining units, and got 'em all
out, IIRC.

They were nearly $100 new, and RS had them at $69. Now, they are
like $39 where they can be found. Unless Cisco re-introduced them,
though that usually results in a model number differential.


It is still listed on the Linksys website, and my WRT54G has a Cisco
"secure Easy Setup" button on the fronnt panel that finds other
Cisco/Linksys wireless devices and sets the password.

--
Service to my country? Been there, Done that, and I've got my DD214 to
prove it.
Member of DAV #85.

Michael A. Terrell
Central Florida
 
M

MassiveProng

Jan 1, 1970
0
It is still listed on the Linksys website, and my WRT54G has a Cisco
"secure Easy Setup" button on the fronnt panel that finds other
Cisco/Linksys wireless devices and sets the password.


That is a newer model than mine. The model number should have
changed for differences that enormous.
 
Top