tag:blogger.com,1999:blog-3798604115389836864.post8147970233504665473..comments2024-03-13T13:04:53.453+00:00Comments on IT Security Expert Blog: Badly Secured Home WiFiSecurityExperthttp://www.blogger.com/profile/02816379340772195492noreply@blogger.comBlogger7125tag:blogger.com,1999:blog-3798604115389836864.post-85088629895647634422008-08-07T19:25:00.000+01:002008-08-07T19:25:00.000+01:00On a lighter, less conspiratorial (is that a word?...On a lighter, less conspiratorial (is that a word?) note, I've been wondering if there's any way to send a message or start chatting with someone I'm "stealing" wifi from when I'm outside with my laptop. I usually surf Wikipedia or such, and want to thank the person in question that he lets me use his connection (where I live, there is a MUCH higher probability of people intentionally leaving their connections unsecured rather than being ignorant of the fact that they do). I'd like to say "thanks" and "btw, you DO know your connection is unsecured, huh?". You know, common courtesy and at the same time informing them just in case. Anyone knows how one would go about doing that? (Assuming that they are using their computers at the time)<BR/><BR/>Also, is there a possibility for them to get at my computer and rummage through stuff in any way?Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3798604115389836864.post-60946046494488473392007-09-05T22:46:00.000+01:002007-09-05T22:46:00.000+01:00We recommend a content filtering solution when ins...We recommend a content filtering solution when installing public wireless hotspots in order to protect both the venue and their visitors from being offended by viewing any websites they deem unsuitable. www.letsgowifi.co.ukAmanda Shawhttps://www.blogger.com/profile/08135305198488685808noreply@blogger.comtag:blogger.com,1999:blog-3798604115389836864.post-78706872598205984302007-06-19T09:59:00.000+01:002007-06-19T09:59:00.000+01:00The technical ability of this kind of threat is th...The technical ability of this kind of threat is that it doesn't require any technical ability to use someone else's unsecured Wifi broadband connection. I don't have any evidence to support the frequency, but I do suggest the frequency of...lets call it "WiFi hi-jacking" is far more wide spread than people realise. Home novices, who lets face it have unsecured wifi network will not be able to detect foreign use of their bandwidth, until they get a fine through the post for downloading an illegal movie. <BR/><BR/>I see a general trend by various authorities to "crackdown" and control internet privacy and the illegal stuff, hence the increase anti-trust news stories, so perhaps this issue will be brought into the fore in the future.<BR/><BR/>At the end of day, everyone should ensure they secure they wifi network.<BR/><BR/>ibneko, yeah I always change the user accounts from the default for that reason.SecurityExperthttps://www.blogger.com/profile/02816379340772195492noreply@blogger.comtag:blogger.com,1999:blog-3798604115389836864.post-35664530109998884502007-06-19T02:00:00.000+01:002007-06-19T02:00:00.000+01:00Hi Dave,Technical ability of the threat agent, nor...Hi Dave,<BR/><BR/>Technical ability of the threat agent, nor the impact isn't the question - the question is the frequency with which threat events (contact AND action) are occurring. <BR/><BR/>I'd say you have a MUCH better chance of winning the lottery. At least that has priors. And when the frequency of threat events are close to zero, so becomes the probability of a loss event.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-3798604115389836864.post-68386583054821068722007-06-18T23:40:00.000+01:002007-06-18T23:40:00.000+01:00Dodgy and illegal websites, as well as more danger...Dodgy and illegal websites, as well as more dangerous things, like using the unsecured wireless to pull identity theft crimes (buying things with a stolen credit card) or maybe, if the owners have file sharing turned on, perhaps stealing sensitive information.<BR/><BR/>It'd also important for end-users to change the default router password - sometime ago, there was a nasty javascript hack of some sort that would modify routers, so victims would be routed to phishing sites when they tried to access, say, a banking site.<BR/><BR/>I think one of the best solutions to this (and the other security problems) is that the manufacturers should have the router redirect all requests to itself, and present the user with a very simple "Please set up your router now" set of pages, forcing the user to enter in a non-default password (which they can write down somewhere in the manual, maybe, if necessary) and enable the security options (WPA, hopefully) before they can actually get online.ibnekohttps://www.blogger.com/profile/04795484492498834779noreply@blogger.comtag:blogger.com,1999:blog-3798604115389836864.post-59099654961037186792007-06-18T21:26:00.000+01:002007-06-18T21:26:00.000+01:00Good question, lets say someone were to hi-jack yo...Good question, lets say someone were to hi-jack your internet bandwidth via WiFi, and that someone then used your bandwidth to go to an illegal child porn website or chat group or even share or download illegal files via peer to peer, and this activity is just happens to be monitored by the child protection police. The first thing the police would do is track and trace it back through the big digital foot print left behind with all internet use, the IP address. The IP internet address foot print left would be the public IP address of your WiFi Router, so not the individual PC. The WiFi Router uses NAT or PAT, so all devices going out onto the net would has same Public IP Address on the Internet. So when the police check the public IP address with the ISP which owns (leases) it, the ISP provides your name and addresss. So I guess it would be up to you to prove it wasn't your PC that was using at the time, which could be some serious hassle and stress. <BR/><BR/>Any if you think the police don't monitor this sort of thing, just check out this report from the UK today, when an internet Child Porn ring was smashed.<BR/><BR/><A HREF="http://news.bbc.co.uk/1/hi/uk/6763817.stm" REL="nofollow">http://news.bbc.co.uk/1/hi/uk/6763817.stm</A>SecurityExperthttps://www.blogger.com/profile/02816379340772195492noreply@blogger.comtag:blogger.com,1999:blog-3798604115389836864.post-1230543176154059122007-06-18T17:43:00.000+01:002007-06-18T17:43:00.000+01:00What's the risk of someone using your unsecured ho...What's the risk of someone using your unsecured home WiFi for dodgy websites?Anonymousnoreply@blogger.com