RonBoyd
Give me a museum and I'll fill it. (Picasso) Give me a forum ...
If there were a link I would have posted it.
Oh.
If there were a link I would have posted it.
I found this re: Louisana Law and piggybacking.
that seemed to escape from the fog I was in... maybe.Louisiana’s laws prohibiting criminal mischief, offenses
against computer users, and computer tampering may allow the
courts to penalize wireless piggybackers without the legislature
having to enact a specific statute criminalizing the offense. Far
more complex, however, is the applicability of trespass to chattels laws to wireless piggybacking. No U.S. jurisdiction has addressed this issue, though it is certain to happen given the nation’s everincreasing number of wireless users. When faced with this dilemma, Louisiana courts must determine whether the reasons for allowing the prosecution of wireless piggybackers logically align with the refusal to afford Wi-Fi users a private remedy.
This was actually from a building my cousin used to live in in Hamilton Ontario. I was visiting one day and and the police showed up and arrested the individual. Warnings re possible compromise of data were later posted in the lobby and office. Unfortunately that is all I know.
I wouldn't say it is a defacto foolish decision to leave a wireless network open.
Here's an article on the topic of the pros and cons of leaving a wireless network open. Along with 100+ highly-technical comments on the subject.
It's by Bruce Schneier, a well-respected computer security expert. He leaves his own home wireless network open.
Another law-abiding citizen who has yet to experience a search warrant, an indictment, or the daily soul-crushing realities of the justice system...
Example, please, of how to do that. Perhaps "very easy" step-by-step instructions on how to access (not-your-own) e-mail on another computer on your network; one that has sharing blocked.
Then there was the guy in a larger apartment building who set up an open wireless system and collected credit card and banking info from everyone who used it.
This was actually from a building my cousin used to live in in Hamilton Ontario. I was visiting one day and and the police showed up and arrested the individual. Warnings re possible compromise of data were later posted in the lobby and office. Unfortunately that is all I know.
Thank you for clarifying. (And I mean that in the nicest, most appreciative way.) Anecdotal evidence does seem, however, to be the bulk of what I have found to work with.
If they want your SSL data they need to work a little harder and put a keystroke logger on your computer.
How could hacking your router let them install a keystroke logger on your computer? How would a keystroke logger give them SSL data (since I never type in encryption keys).
Perhaps it was cut-and-paste; I don't recall, exactly, how I moved the keys from the utility program that generated them to the place where SSL could find them.If you don't type in the keys, how do you use them? Cut and paste?
I'd get a new ISP and supply and configure my own router. That's just me, I am a former IT security person, YMMV.I'm with Schneier, but then I can afford to be, since my ISP supplies the router and the WiFi is tied down, so I don't get to choose to leave it open.![]()
In any case, the issue is not your own PC(s) getting hacked - nobody is going to take the risk of getting close to your home to target your WiFi to attack your PC when they could do it just as well from across the world over the Internet.
The point, as I'm understanding it, is that you might choose not to securitize your system, giving your neighbors free internet access. Or they might do that for you. Just because you know how to deny neighbors access to the internet through your system, that doesn't mean you necessarily have to do so.I'm not sure I understand the point of this discussion. It took me about 30 minutes max to set up security when I installed a new router.
And if they, actually, get into your computer, they can find your exact location and come and get you.
Darnay's Ultra Easy Internet Locator Website
Example, please, of how to do that. Perhaps "very easy" step-by-step instructions on how to access (not-your-own) e-mail on another computer on your network; one that has sharing blocked.
Example, please, of how to do that. Perhaps "very easy" step-by-step instructions on how to access (not-your-own) e-mail on another computer on your network; one that has sharing blocked.
And in case you weren't aware of it, Windows makes available a drive letter for the hard drives on your system. They are C$ (D$ if you have a D: drive), etc.
Oh, and FWIW, while I don't bother locking down my computers very much ... I also don't leave any personal information on the computer. That goes for spreadsheets, logins, etc. And for the short times that they are on my PC, I either have them encrpyted, or I disconnect from the network altogether.
That is one purpose of thumb drives, flash, and external hard drives.
Actually lots of people have their compromised PCs incorporated in bot nets without their knowledge and used as storage bins for pirated videos, porn and the like. Leaving a network unsecured through ignorance is a good first step on that road. But, knowledgeably sharing a secured wireless connection with a neighbor seems OK. Unless you are pretty knowledgeable your home network will be relatively open to the neighbor (just like it is to your kids and their visiting friends). But as long as you don't share any of your files you would probably be OK. And you could learn how to lock down your computers if you were concerned. If you keep extremely sensitive stuff on the PC you better use good encryption in any event.I'm still a little unclear on who gets the search warrant for child pornography or pirated media or other illicit activity-- the router owner or the users?