Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

wireless

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » DU Groups » Computers & Internet » Computer Help and Support Group Donate to DU
 
plcdude Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Nov-15-04 10:30 AM
Original message
wireless
can my neighbor figure out I am using his wireless connection?
Printer Friendly | Permalink |  | Top
RawMaterials Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Nov-15-04 10:35 AM
Response to Original message
1. if he could you wouldnt be using it
He would have allready set it up the right way. blocking unregisterd mac address.
Printer Friendly | Permalink |  | Top
 
plcdude Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Nov-15-04 10:39 AM
Response to Reply #1
2. mac address
I have a dell laptop and discovered that my neighbor has a wireless connection. I am tempted every once in awhile because it is faster than my dial up to jump on that connection but would be embarrassed to having been discovered.
Printer Friendly | Permalink |  | Top
 
The Spirit of JFK Donating Member (528 posts) Send PM | Profile | Ignore Mon Nov-15-04 10:39 AM
Response to Original message
3. Yes
If he kind of knows what he's doing...he can monitor the connections to his wireless router.

If you are asking if he can find out it's YOU...technically it's possible, but highly doubtful. He can easily get your IP address and then try and do some lookups, if he knows what he's doing. He'll most likely just put a password on his wireless network.

Of course, seeing you stand by the window with your laptop and Pringles can antenna aimed at his house will probably give you away...
Printer Friendly | Permalink |  | Top
 
plcdude Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Nov-15-04 10:42 AM
Response to Reply #3
4. I guess
I'd better hide the antenna.
Printer Friendly | Permalink |  | Top
 
plcdude Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Nov-15-04 10:44 AM
Response to Reply #3
5. how do you locate
IP addresses and figure out to whom they belong?
Printer Friendly | Permalink |  | Top
 
LibLabUK Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Nov-15-04 12:02 PM
Response to Reply #5
6. Hmm...
If your computer is asking his router (or other DHCP server) for an IP address then he'll have a list of the assigned IP addresses readily available to him, and all he'd have to do is look at it.

If your PC's named plcdude's PC, he'll see that in the assigned IP table and probably want a chat with you.

Printer Friendly | Permalink |  | Top
 
The Spirit of JFK Donating Member (528 posts) Send PM | Profile | Ignore Tue Nov-16-04 09:28 AM
Response to Reply #5
11. The router will tell you what IP addresses are connected
And there are utilities that will allow you to scan that particular IP address for open ports...If that computer is not secured and you know what you are doing, you can get into that computer, rummage around, and figure out who owns it.

My brother in law is working on a program that allows hackers into the system, but keeps forwarding them to a chain of bougus folders and directories....making them THINK they are getting somewhere. Meanwhile, the program is doing a reverse trace on them and downloading particular log files and such.. Pretty interesting, actually.
Printer Friendly | Permalink |  | Top
 
BlueJazz Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Nov-15-04 07:20 PM
Response to Reply #3
9. HA!...you know about the pringles can..cool...
Printer Friendly | Permalink |  | Top
 
The Spirit of JFK Donating Member (528 posts) Send PM | Profile | Ignore Tue Nov-16-04 09:49 AM
Response to Reply #9
13. I've built a couple
My brother in law is one of those network security freaks and he likes to build all the hacker tools.

And my brother lives in Africa and is studying ways of transmitting a signal over a long distance (to a school he is helping to build as a side project)...so he has been studying schematics and such for a while, but started small (Pringles can).
Printer Friendly | Permalink |  | Top
 
RawMaterials Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Nov-15-04 03:47 PM
Response to Original message
7. what you should do is
learn how to configure his router, walk over explain how anyone can get onto his network for free. tell him you will fix the problem secure his network. tell him you will do this for free if he lets your laptop onto the network to share the connection, then don't hog his bandwidth and everyone should be happy.
Printer Friendly | Permalink |  | Top
 
Caution Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Nov-15-04 04:20 PM
Response to Original message
8. He could easily see you on his network
from there if you are a windows PC he can see the name and any description of your machine. If your machine is unsecured there are any number of ways he could get additional info about it (remotely connect to your registry and then search for "name" will usually find programs which you registered in your name). There are a number of other ways to get information that may identify you from your computer.

Even if you do not broadcast the standard windows identified info, he'll be able to see you in his router getting an IP address and be able to do various tricks to find out who you are (assuming some ability with windows or linux).

This is also considered Theft of Service and is a crime.
Printer Friendly | Permalink |  | Top
 
LibLabUK Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Nov-15-04 07:41 PM
Response to Reply #8
10. Hmm..
"(assuming some ability with windows or linux)."

The bloke can't even lock down a WAP, what's the odds that he has even a basic understanding of windows or linux networking :)

Unless he deliberately left his WAP open for everyone to use, that's not unknown.

Either way it's pretty bad form to use someone's connection without permission.

I've got my WAP locked down (SSID Broadcast disabled, MAC address restriction, a limited number of pre-assigned IP addresses and WEP encryption), it's not foolproof but it'll stop casual connectors and wardriving.
Printer Friendly | Permalink |  | Top
 
Caution Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-16-04 10:38 AM
Response to Reply #10
15. true. but just because he is now an idiot doesnt mean he'll always be one
Printer Friendly | Permalink |  | Top
 
The Spirit of JFK Donating Member (528 posts) Send PM | Profile | Ignore Tue Nov-16-04 09:32 AM
Response to Reply #8
12. It's Theft of Service, BUT...
It's my understanding that if someone else is able to do somethig bad....like hack a server, illegally download tons of music...on YOUR network than YOU can get into trouble.

Is this true?
Printer Friendly | Permalink |  | Top
 
Caution Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-16-04 10:38 AM
Response to Reply #12
14. If you can prove this is the case
then no, there really isnt a way they can make a case for you being responsible.
Printer Friendly | Permalink |  | Top
 
LibLabUK Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Nov-16-04 10:59 AM
Response to Reply #14
16. Hmm..
You could probably use a modified version of the 'trojan defence' that people accused of various nefarious online activities have claimed that they were the unwitting dupes of a trojan infection.

That being said, it's better to be safe than sorry.
Printer Friendly | Permalink |  | Top
 
The Spirit of JFK Donating Member (528 posts) Send PM | Profile | Ignore Tue Nov-16-04 11:23 AM
Response to Reply #14
17. Related- NH law makes it harder to prosecute theft of service
If the network is unsecured.

It defines an operator's failure to secure a wireless network as a form of negligence. According to the amendment, "the owner of a wireless computer network shall be responsible for securing such computer network."

It seems like the next step would be to hold them partially responsible for any crimes committed using their network.

Of course, if someone steals your car (even if the keys are in it) and commits a crime with it, I'm not sure the owner has any liability (although their insurance rates will certainly skyrocket). And even with some of the better security features, networks are still hackable, so I'm not sure how they will decide what is "secured" and what isn't.


Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Thu Oct 31st 2024, 07:33 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » DU Groups » Computers & Internet » Computer Help and Support Group Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC