Re: security re: file sharing/networks

2006-01-15 Thread Brian McEwen


On Jan 14, 2006, at 11:41 PM, Amber R. wrote:

I have a D-Link wireless router - there are options to change from  
the WEP 128 bit encryption to WPA personal.Would doing this  
create enough of a wall for most people trying to hack in ?


Just turning on one of the 2 built-in restrictions will keep 99.999%  
of people out of your network.  The 0.001% that want in and want to  
bother, can get in no matter what.




While I have been trying not to  use the wireless router  (given  
the situation with my neighbour that I mentioned earlier today),  I  
really need to have access to it here and there as I have a lot of  
work to get done and cannot easily do it at my computer desk.


I was thinking I could perhaps create another network name and WPA  
and perhaps stay hidden from her brother.




Changing the name of our station will last all of 5 seconds or so  
before someone looking will know.  Even if you turn off SSID  
broadcast (of the name of the network) sniffing software will still  
be able to see that it is there, and what the name is, if someone  
(you) is connected.


WPA is easier to crack than WEP, per the proof-of-concept articles I  
just found googling for WPA crack.  I didn't look for software for  
cracking WPA but I'm sure it exists, I've read articles about  
software for WEP decryption, there are several options.


Turn on WEP, turn on MAC address filter as I mentioned before,  
whitelist the MAC ID of your laptop(s) and keep half an eye on your  
logs.  It is really unlikely they will hack in, and if they do, you  
can either ban the MAC ID of anything that does connect, or call  
someone about it, or both.


Their breaking in is really not likely to be an issue if you enable  
the built-in security options, and if it is, you will see it going on  
and can do something at that time.


There's a lot of media hype and not a lot of there there, if you  
know what I mean.


Put MacStumbler or KisMac on your Mac laptop.  Look around when you  
are out and about, to get a feel for how this works, and what is  
really available and what is not accessible even though you can see  
it.   Look at your own network with one of these softwares to make  
sure the setting you think you have enabled, are enabled.  A bit of  
education and experience and you will worry less about your setup,  
and be comfortable with the technology and be able to keep your LAN  
useful to you yet sensibly protected.


-B




--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
 -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-15 Thread Howard Katz
Amber--

It also sounds like a story you could sell to a TV writer.  Keep us
informed as to what happens.  It DOES sound like they want your
connection for something more than just checking their email and
surfing once in a while!

LaterHoward

--
G-Books is sponsored by http://lowendmac.com/ and...

 Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
 -- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

  Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
  -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-15 Thread Howard Katz
I think the bottom line is:

Whether or not you thinks laws are good or not, or protect people or
not, or are in favor of anarchy or not, laws do exist, usually for a
purpose.

If you feel it's ok to share YOUR wireless connection with someone
else, that's your choice.

If you feel it;s NOT ok to share said connection, that's your choice
and others should respect that.

Should they not accept it to the point of threats (and that's what
next-door-neighbor is doing) then the cops should be called. 
Immediately.


Later.Howard

--
G-Books is sponsored by http://lowendmac.com/ and...

 Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
 -- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

  Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
  -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-15 Thread bobgir2004
Brian - Thanks so much for the feedback and guidance.

You said:
 Setting a password, turning off remote admin, and making
 sure you check for firmware updates once in a while (you are current
 at the moment for a v3 BEFSR41) are the important things for your
 setup, as I see it.

Password is a strong one, remote admin is indeed turned off and I do
check every once in awhile for firmware updates.

You also said:
 You need to look under wireless/security and turn on MAC address
 filtering and WEP to control these things on a wireless router.

I did not provide sufficient info on my setup. Here it is.

DSL modem connected to the wired Linksys router.

Linksys connected to my G5 iMac via ethernet cable AND connected to my
ancient Graphite Apple Base Station which in turns links our two laptops in
a small home network.

I checked out the ABS and found under the Access Control Tab's sub tab
AirPort ID, I have entered the AirPort ID number of each of my two iBooks.

Tell me...am I good to go, security-wise?

bob




-- 
G-Books is sponsored by http://lowendmac.com/ and...

 Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
 -- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

  Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
  -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-15 Thread darm0k

At 8:41 PM -0800 01/14/2006, Amber R. wrote:
I have a D-Link wireless router - there are options to change from 
the WEP 128 bit encryption to WPA personal.Would doing this 
create enough of a wall for most people trying to hack in ?


WEP will lock out 99.9%.

WPA is better (but pls remember to use a long key).

You could also set your router to only talk to specific MAC 
addresses.  That way your users have to be on a specifically 
authorized computer AND know the WEP or WPA key.


I was thinking I could perhaps create another network name and WPA 
and perhaps stay hidden from her brother.


Not worth the effort, IMO.  Just secure what you have and let the 
cops handle any further threats.


- Dan.

--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
 -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-15 Thread Brian McEwen


On Jan 15, 2006, at 1:14 PM, bobgir2004 wrote:


I did not provide sufficient info on my setup. Here it is.

DSL modem connected to the wired Linksys router.

Linksys connected to my G5 iMac via ethernet cable AND  
connected to my
ancient Graphite Apple Base Station which in turns links our two  
laptops in

a small home network.

I checked out the ABS and found under the Access Control Tab's  
sub tab
AirPort ID, I have entered the AirPort ID number of each of my two  
iBooks.


Tell me...am I good to go, security-wise?


AirportID is just a cute JobsSpeak for MacID, apparently, per google,  
so getting them listed is good; on all my WAP's (non apple) you can  
have a listing but still turn the MAC ID restrictions on/off (or  
whitelist or blacklist by MAC ID); so just make sure you really are  
doing something with an appropriate menu item and you should be as  
good as reasonably possible!


B




--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
 -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-15 Thread John Siple
Indeed. Aber's neighbor seems to think she's entitled to use the  
connection. That's rude.


There might be other options though. I heard a friend mention that he  
had some router setting that allowed him to not broadcast the SSID. I  
wasn't too interested at the time so I didn't ask what brand of  
router he was using. But this capability would be a clean solution to  
the nosey neighbor and still allow Amber to use her own wireless  
systems, which she ought to be able to do.


Masking the SSID might be the only way to solve the intrusion without  
making everyone uncomfortable.


There are also some directional antenna setups that limit  
transmission in one axis to amplify it in another. But why she should  
have to spend money to solve this rudeness is beyond me.


Hard to live with a neighbor like that though.

JS
On Jan 14, 2006, at 5:01 PM, Shawn Harley wrote:

Amber,

Sounds like you should return the favor with a visit to your  
neighbor (along with a member of the local law enforcement community)  
to explain your position and let her try out her implied strong arm  
tactic (regarding her brother dealing with you) on your new found  
friend.


I would not put up with crap like that, and would make it clear that  
she and her brother understood that. Plus, it gives you a documented  
record in case he does hack into your network illegally.


Shawn


On Jan 14, 2006, at 7:14 PM, Amber R. wrote:


My neighbour was back at my door this AM asking again (third time  
this past week)  for access and the WEP password.  She was  
extremely ticked off when I informed that I was still not  
interested or comfortable with giving her access, then said her  
brother was going to be coming by to deal with me later.





--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished  
Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on  
Sale!  |


 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
 -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---





--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
 -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
 -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-15 Thread Brian McEwen


On Jan 15, 2006, at 6:24 PM, John Siple wrote:

broadcast the SSID. I wasn't too interested at the time so I didn't  
ask what brand of router he was using. But this capability would be  
a clean solution to the nosey neighbor and still allow Amber to use  
her own wireless systems, which she ought to be able to do.


This can make WinXP clients drop a connection a little more often  
(due to a bug in XP) (bad if you are a legitiamte user of the LAN)  
but if someone looks, you can still see the station ID if the station  
is in use.  With the cloaking, the SSID is not in the broadcast  
packet, but it is in the response packet, so anyone sniffing will  
have access to it anyway (assuming a legit user connects sometime).


See any of many pages for details.  http://www-128.ibm.com/ 
developerworks/wireless/library/wi-roam5.html for example.


Again, it's one of those things that only keeps mostly honest people  
out, like all of wireless security.


B


--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
 -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks (was Re: Wireless router that handles AppleTalk)

2006-01-14 Thread darm0k

At 6:00 PM -0800 01/13/2006, John Siple wrote:
There are a few considerations here. I've thought about this a bit. 
I have a neighbor who is running an unencrypted network.  I 
sometimes log on to see if network problems are because of my ISP or 
because of my hardware. Mostly my  connection is handier so I use 
mine. I also have an unencrypted network. She could log onto mine if 
her ISP gets goofy. I don't think she  knows that.


But the legalities of exactly who owns bandwidth are undefined.


No, they're not.  The bandwidth is owned by the ISP.  You're 
permitted to use it based on the limitations set in the AUP/TOS.


AUP = Acceptable Use Policy
TOS = Terms of Service

For instance let's say that I pay an outrageous fee for my 
connection, which I do, but I need to go on a little trip and while 
visiting relatives I find an unencrypted access point that connects 
to my original comcast ISP. Am I stealing bandwidth to use it? I 
would be doing the same stuff at home but ...


In the case of Comcast... Sharing your connection beyond your 
premises is Theft Of Services.  Using a Comcast connection that 
someone has left open is Theft Of Services.  Being a Comcast customer 
in one area does not give you carte blanche to jack in anywhere.


And what is the situation of my own home use? I have 4 Macs and a 
printer all clawing their way to my router. Sometimes, like during 
Christmas when my girls are home with their own laptops, I have 
five. It's all my own family. I still pay rent for all these kids.


Woohoo!  Kids that you can return when the lease expires!  This is 
why I don't mind babysitting -- you get to give them back when they 
get cranky!  :)


Why shouldn't they be able to use my WAN the way they can use the 
heat inside my house?


You mean yer LAN.  Even with a wireless hop, it's still local.

They should, do, and are permitted per the Comcast agreements. 
Comcast will not provide technical support your LAN, unless you pay 
for that support.  But you're certainly allowed to fill your home 
with your kids (leased or owned) and their equipment.


...I remember the early @Home days, when in many areas the TOS 
specifically stated you could not use NAT.  To connect multiple 
computers, you had to purchase an individual IP for each, for a few 
bucks per month.  Entre the Bells and xDSL - who permitted NAT.  The 
pressure made @Home change their policy.  Havoc then occured in some 
areas because the MSOs had used the 192.168/16 block for some of 
their intranet (local routers and such)... it made routing 
interesting when customers misconfigured their home routers!


And why should the woman next door, who has one, maybe two computers 
and no family be paying the same rate I pay? Is she getting ripped 
off? I kind of think so.


She has the same service level caps that you do.  She can use the 
same amount of bandwidth as you.  So of course she should pay the 
same.  Same goes for her phone line, sewer, water, gas, and electric 
hookups.  +/- metering.


Beware them people what live alone.  They're often the heavy gamers 
or p2p'ers that eat all the upstream bandwidth on your drop!


I have also gone down the block to a free internet zone sponsored by 
the city and connected there. Sometimes I go to the library and they 
have open connections. Is it somehow unfair use that my neighbor 
can't take her PC downtown and connect with it? She pays the same 
taxes I pay.


Why can't she take her PC downtown?

I know someone who borrows her neighbor's wireless connection for 
free. He knows about it. She admits it would be better if she got 
her own.


Interesting ethos there.  If you saw two people steal merchandise 
worth, say $45, each month, don't you have an obligation to report 
them?  And if you keep mum about it, doesn't that make you liable as 
part of their criminal conspiracy?


Oh there are just sooo many annoying things you could do to this 
person. Change your SSID to a racial slur. Change it to something 
that pokes her politics.


hum.   hum?   hum!  oOOOo
*chuckle**cough**LOL**ROFL**cough**lung**cough**LOL*

- Dan.

--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
 -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-14 Thread darm0k

At 11:52 PM -0800 01/13/2006, Clem Bacani wrote:
Drive around the neighborhood, park your car, open your laptop with 
broadband wireless adapter and presto you are connected online.
Chances are you will have more than one signal within that area. 
You are not stealing a signal because you are not intruding to 
someone else's property.  Incidentally, the signal is there in the 
air for you to use.


Indeed it is a gray area.


Unless the signal is originating from a source with a TOS that 
permits sharing beyond the premesis, it is theft of services.  Period.


This is not like radio - where you're only receiving.  This is 
bi-directional communication.


- Dan.

--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
 -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-14 Thread Amber R.


On 13-Jan-06, at 11:52 PM, Clem Bacani wrote:

Drive around the neighborhood, park your car, open your laptop with  
broadband wireless adapter and presto you are connected online. 
Chances are you will have more than one signal within that area.   
You are not stealing a signal because you are not intruding to  
someone else's property.  Incidentally, the signal is there in the  
air for you to use.


Not true - it is theft of service and you are intruding, even though  
you are not literally in their home.
The signal you pick up is likely only open simply because a resident  
in that area who has a wireless router did not bother to, or does not  
know how to,  set up security to protect their network.
This does not make it legal for you to surf and is not a gray area at  
all.


Actually, what you suggest above is just as much a crime as walking  
into somebody's home because you found the door unlocked and using/ 
stealing their property.


Amber





--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
 -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-14 Thread Tim Collier
I totally agree on this one.  I don't think the laws have caught up with the 
technology yet.  It's a matter of the (restating the obvious) the technology 
having advanced so fast that legislation has not been able to act on the 
legality of intrusion into somebody else's home network.  Yes, a lot of people 
have no clue about how to secure their networks.  Right now, as I sit here 
typing this, if I click on the Airport icon, I can see  3 other networks in my 
area.  2 are secured as is mine.  The other, it just calls itself 'linksys' is 
totally open.  I have been able to connect to the net with it and get my mail.  
I wish I knew who this network belonged to, I'd certainly offer to help him/her 
secure it.

Tim
On Saturday, January 14, 2006, at 10:40AM, Amber R. [EMAIL PROTECTED] wrote:


On 13-Jan-06, at 11:52 PM, Clem Bacani wrote:

 Drive around the neighborhood, park your car, open your laptop with  
 broadband wireless adapter and presto you are connected online. 
 Chances are you will have more than one signal within that area.   
 You are not stealing a signal because you are not intruding to  
 someone else's property.  Incidentally, the signal is there in the  
 air for you to use.

Not true - it is theft of service and you are intruding, even though  
you are not literally in their home.
The signal you pick up is likely only open simply because a resident  
in that area who has a wireless router did not bother to, or does not  
know how to,  set up security to protect their network.
This does not make it legal for you to surf and is not a gray area at  
all.

Actually, what you suggest above is just as much a crime as walking  
into somebody's home because you found the door unlocked and using/ 
stealing their property.

Amber





-- 
G-Books is sponsored by http://lowendmac.com/ and...

 Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
 -- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

  Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
  -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---





Exterminate all rational thought.

-- 
G-Books is sponsored by http://lowendmac.com/ and...

 Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
 -- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

  Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
  -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-14 Thread Amber R.


Is it illegal if I'm visiting a person and log on with my PowerBook?
Or if 2 unrelated persons are sharing an apartment, is it illegal  
for both to utilize the service?

Seems like a gray legal area.

Jerry



You will find that there usually is not a gray area at all if you  
read the TOS ( terms of service) for the ISP involved.   They are  
quite specific about how their services are to be used.


Of course, I am sure there are hundreds of people who visit friends  
with wireless connections and just open up their laptops and surf.
Is it legal ? again depends on the ISP TOS, but there can be serious  
consequences.


i.e. The person paying for the service would be liable for anything  
illegal their guest/visitors were caught doing on-line as it all  
would come back to their IP address.  Unless you could prove it was  
your guests who were responsible,  you would be the one going to jail.


This was just one concern I had about my neighbour and her brother  
having access to my network.


As for 2 unrelated persons sharing an apartment -  In most cases,   
tenants will share the cost of the service and both have legal access  
to it.  As long as this is permitted by the ISP,  it's legal.  Most  
ISP's allow this as many families will have multiple computers and  
want internet access for all of them.


Amber

--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
 -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-14 Thread Dyna

This theft of service bull is nonsense!

	If I buy a subscription to say, MacWorld, then leave it in 
the break room at work for my coworkers to read after I've read it, 
that's sharing, not stealing. If I buy bandwidth from the local telco 
or cable company and let my neighbors have what I don't need, that's 
sharing, not stealing.


	Granted, the telcos and cable industry with their lobbyists 
have managed to persuade congress otherwise, but those laws are 
unenforceable anyway- is anyone doing time in club fed for theft of 
service with their home computer?



On 13-Jan-06, at 11:52 PM, Clem Bacani wrote:

Drive around the neighborhood, park your car, open your laptop with 
broadband wireless adapter and presto you are connected online.
Chances are you will have more than one signal within that area.  
You are not stealing a signal because you are not intruding to 
someone else's property.  Incidentally, the signal is there in the 
air for you to use.


Not true - it is theft of service and you are intruding, even though 
you are not literally in their home.
The signal you pick up is likely only open simply because a resident 
in that area who has a wireless router did not bother to, or does 
not know how to,  set up security to protect their network.

This does not make it legal for you to surf and is not a gray area at all.

Actually, what you suggest above is just as much a crime as walking 
into somebody's home because you found the door unlocked and 
using/stealing their property.


Amber



--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
 -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-14 Thread Howard Katz
There's a difference between sitting outside a public library that
offers free internet (with the permission and understanding of their
service provider) and sitting outside someone's home and accessing a
wifi signal that wasn't locked down.  To say there isn't, or that just
because it's there and you can use it, is just rationalization of
theft.  If the laws change to allow that, fine, but 1) the laws aren't
written that way, and 2) with the vested interests that the service
providers have in selling service, they probably won't be.

Have I done some signal sniffing?  Sure, I'll bet we all have, just to
see if we could do it.  Did I continue to do so?  Nope--in fact I
tracked down the person who had the open signal in my area and advised
them to encrypt their signal.  At that point it's their
responsibility.l

My Airport widget tells me there's 2 WEP signals nearby--at least
these folk know how to turn their security settings on.  :)


Later..Howard

--
G-Books is sponsored by http://lowendmac.com/ and...

 Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
 -- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

  Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
  -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-14 Thread Amber R.


On 14-Jan-06, at 8:18 AM, Dyna wrote:


This theft of service bull is nonsense!

	If I buy a subscription to say, MacWorld, then leave it in the  
break room at work for my coworkers to read after I've read it,  
that's sharing, not stealing. If I buy bandwidth from the local  
telco or cable company and let my neighbors have what I don't need,  
that's sharing, not stealing.


Actually, the latter is normally against your terms of service so it  
is theft of service - not from you, but from the cable company.   You  
allowing it to happen makes you just as guilty.


	Granted, the telcos and cable industry with their lobbyists have  
managed to persuade congress otherwise, but those laws are  
unenforceable anyway- is anyone doing time in club fed for theft  
of service with their home computer?


Just because the laws governing the theft of signal are currently  
difficult to enforce, it doesn't mean it's okay to break these laws.


It would seem that as long as you can get away with something, it's  
okay for you or others to do it.


Here is an example of a law being temporarily unenforceable - There  
is a major riot going on in a large city and people are looting  
stores/businesses left and right because there are not enough police  
resources to apprehend them.   Laws are still being broken.   Theft  
and vandalism are still are occurring.   Just because these people  
are not being caught and charged does not mean a crime has not been  
committed.


Amber

--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
 -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-14 Thread Dyna
	Howard and Amber, perhaps my age is showing here, and the 
fact that I don't work in the computer biz. I was raised in the day 
when you were expected to pay for things like new books, bicycles, 
etc But once you'd bought them they were yours and you could loan 
or give your magazine or bicycle to a friend or neighbor as you 
wished.


	What has happened in the past few years is that the software 
companies, telcos, and cable companies have managed to pass 
tyrannical laws that stand centuries of legal tradition dating back 
to english common law on it's head. As a result people working in the 
computer biz are terrified that they'll be fired and blacklisted for 
installing an unwrapped copy of Windoze 95 on a friends old computer, 
etc.


	For us ordinary civilians who do not rely on the Micro$oft et 
al food chain for our sustenance this paranoia is pretty ridiculous. 
For example over the years when I had nothing to do at work I'd 
download my e-mail from the coffee shop across the streets Wi-Fi. I 
also went over their on breaks often and bought coffee and such. Was 
I stealing, or merely taking advantage of a free service they were 
providing? While travelling at night I have also parked next to a 
closed public library and used their Wi-Fi to check my e-mail, the 
weather, etc Was that stealing?


	Now if I were to walk into my local police station and turn 
myself in for these crimes they'd laugh me outa the place- they have 
real crime to deal with and don't want to be bothered with this BS. 
If I really insisted and it was a slow day they might write me a 
ticket for petty misdeanor theft and give me a phone number to call 
to set a court date months off. When I arrived in court (most 
likely an office cubicle with a fresh out of law school referee 
presiding) my case would go to the bottom of the docket. Around 5 pm, 
after all the real petty misdemeanors had been dealt with, I'd get my 
day in court. His eye on the clock, the prosecuting attorney would 
offer to drop the charges... when I refused to accept that he'd tell 
me to prosecute myself then, and head out the door. The referee would 
sentence me to one hours probation and maybe $100 court costs if I 
complained further as she put on her jacket and raced out the door.


So let's quit being paranoid and let some common sense prevail.


On 14-Jan-06, at 8:18 AM, Dyna wrote:


This theft of service bull is nonsense!

	If I buy a subscription to say, MacWorld, then leave it in 
the break room at work for my coworkers to read after I've read it, 
that's sharing, not stealing. If I buy bandwidth from the local 
telco or cable company and let my neighbors have what I don't need, 
that's sharing, not stealing.


Actually, the latter is normally against your terms of service so it 
is theft of service - not from you, but from the cable company. 
You allowing it to happen makes you just as guilty.


	Granted, the telcos and cable industry with their lobbyists 
have managed to persuade congress otherwise, but those laws are 
unenforceable anyway- is anyone doing time in club fed for theft 
of service with their home computer?


Just because the laws governing the theft of signal are currently 
difficult to enforce, it doesn't mean it's okay to break these laws.


It would seem that as long as you can get away with something, it's 
okay for you or others to do it.


Here is an example of a law being temporarily unenforceable - There 
is a major riot going on in a large city and people are looting 
stores/businesses left and right because there are not enough police 
resources to apprehend them.   Laws are still being broken.   Theft 
and vandalism are still are occurring.   Just because these people 
are not being caught and charged does not mean a crime has not been 
committed.


Amber

--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
 -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  

Re: security re: file sharing/networks

2006-01-14 Thread Harry Corsover
I've also recently noticed a LinkSys open network, and I'd like to  
know who it is so I could offer to help. I'm also surprised, since  
our house is several hundred feet away from the nearest neighbor. I  
guess they installed a high-gain antenna.


I also use a (directional) high-gain antenna on my SMC Barricade G,  
so the signal can penetrate an area with high interference (which i  
haven't been able to identify). One of these days I'll walk around  
the neighborhood with MacStumbler on so I can figure out whose signal  
the LinkSys is, and make sure my signal doesn't reach the neighbors.


Since I use an OS X 10.4.4 PowerBook and my wife uses an old  
clamshell iBook, we can't use (AFAIK) the same WEP encryption (and  
the iBook can't use newer security methods). I've figured it didn't  
matter since we're so far from neighbors and set back quite a bit  
from the road, but I guess I'll check.


Regards,

Harry Corsover
--
On Jan 14, 2006, at 8:57 AM, Tim Collier wrote:

I totally agree on this one.  I don't think the laws have caught up  
with the technology yet.  It's a matter of the (restating the  
obvious) the technology having advanced so fast that legislation  
has not been able to act on the legality of intrusion into somebody  
else's home network.  Yes, a lot of people have no clue about how  
to secure their networks.  Right now, as I sit here typing this, if  
I click on the Airport icon, I can see  3 other networks in my  
area.  2 are secured as is mine.  The other, it just calls itself  
'linksys' is totally open.  I have been able to connect to the net  
with it and get my mail.  I wish I knew who this network belonged  
to, I'd certainly offer to help him/her secure it.


Tim




=
Feel better, look younger, live longer and make more money with  
Synergy Worldwide:


Harry Corsover
[EMAIL PROTECTED]303-909-9218
www.harryc.biz




--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
 -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-14 Thread Clem Bacani

You hit the nail in the head.  You are the modern day Robin Hood.

On Jan 14, 2006, at 9:33 AM, Dyna wrote:

	Howard and Amber, perhaps my age is showing here, and the fact  
that I don't work in the computer biz. I was raised in the day when  
you were expected to pay for things like new books, bicycles,  
etc But once you'd bought them they were yours and you could  
loan or give your magazine or bicycle to a friend or neighbor as  
you wished.


	What has happened in the past few years is that the software  
companies, telcos, and cable companies have managed to pass  
tyrannical laws that stand centuries of legal tradition dating back  
to english common law on it's head. As a result people working in  
the computer biz are terrified that they'll be fired and  
blacklisted for installing an unwrapped copy of Windoze 95 on a  
friends old computer, etc.


	For us ordinary civilians who do not rely on the Micro$oft et al  
food chain for our sustenance this paranoia is pretty ridiculous.  
For example over the years when I had nothing to do at work I'd  
download my e-mail from the coffee shop across the streets Wi-Fi. I  
also went over their on breaks often and bought coffee and such.  
Was I stealing, or merely taking advantage of a free service they  
were providing? While travelling at night I have also parked next  
to a closed public library and used their Wi-Fi to check my e-mail,  
the weather, etc Was that stealing?


	Now if I were to walk into my local police station and turn myself  
in for these crimes they'd laugh me outa the place- they have real  
crime to deal with and don't want to be bothered with this BS. If I  
really insisted and it was a slow day they might write me a ticket  
for petty misdeanor theft and give me a phone number to call to set  
a court date months off. When I arrived in court (most likely an  
office cubicle with a fresh out of law school referee presiding) my  
case would go to the bottom of the docket. Around 5 pm, after all  
the real petty misdemeanors had been dealt with, I'd get my day in  
court. His eye on the clock, the prosecuting attorney would offer  
to drop the charges... when I refused to accept that he'd tell me  
to prosecute myself then, and head out the door. The referee would  
sentence me to one hours probation and maybe $100 court costs if I  
complained further as she put on her jacket and raced out the door.


So let's quit being paranoid and let some common sense prevail.


On 14-Jan-06, at 8:18 AM, Dyna wrote:


This theft of service bull is nonsense!

	If I buy a subscription to say, MacWorld, then leave it in the  
break room at work for my coworkers to read after I've read it,  
that's sharing, not stealing. If I buy bandwidth from the local  
telco or cable company and let my neighbors have what I don't  
need, that's sharing, not stealing.


Actually, the latter is normally against your terms of service so  
it is theft of service - not from you, but from the cable company.  
You allowing it to happen makes you just as guilty.


	Granted, the telcos and cable industry with their lobbyists have  
managed to persuade congress otherwise, but those laws are  
unenforceable anyway- is anyone doing time in club fed for theft  
of service with their home computer?


Just because the laws governing the theft of signal are currently  
difficult to enforce, it doesn't mean it's okay to break these laws.


It would seem that as long as you can get away with something,  
it's okay for you or others to do it.


Here is an example of a law being temporarily unenforceable -  
There is a major riot going on in a large city and people are  
looting stores/businesses left and right because there are not  
enough police resources to apprehend them.   Laws are still being  
broken.   Theft and vandalism are still are occurring.   Just  
because these people are not being caught and charged does not  
mean a crime has not been committed.


Amber

--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished  
Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on  
Sale!  |


 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
 -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished  

Re: security re: file sharing/networks

2006-01-14 Thread darm0k

At 8:17 AM -0800 01/14/2006, Amber R. wrote:
Of course, I am sure there are hundreds of people who visit friends 
with wireless connections and just open up their laptops and surf.   
Is it legal ? again depends on the ISP TOS, but there can be serious 
consequences.


i.e. The person paying for the service would be liable for anything 
illegal their guest/visitors were caught doing on-line as it all 
would come back to their IP address.  Unless you could prove it was 
your guests who were responsible,  you would be the one going to 
jail.


This was just one concern I had about my neighbour and her brother 
having access to my network.


Very real concerns.

You've heard of Spam Vans?  Spammers that outfit a vehicle with 
equipment, then drive around looking for access...  Originally, they 
were going to small ISPs and offering them $5K cash for a cat5 hookup 
for a day.  When the ISPs caught on to the blacklist nightmares that 
caused, the spammers went wireless and started wardriving...


As for 2 unrelated persons sharing an apartment -  In most cases, 
tenants will share the cost of the service and both have legal 
access to it.  As long as this is permitted by the ISP,  it's legal. 
Most ISP's allow this as many families will have multiple computers 
and want internet access for all of them.


To take this a step further... I had a great experience with Comcast 
a year ago...  A friend's son wanted to have his buddies over to play 
some game over the 'net.  A dozen computers, etc.  He drafted me to 
help set up the LAN to handle it.  Then the boy started complaining 
that the Comcast hookup wasn't fast enough for all those people.  So 
we contacted Comcast.  Not only were they ok with having that many 
people connected to thru the one residential service point, but they 
even doubled the speed caps for the weekend - and only charged him $5 
for it.


- Dan.

--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
 -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-14 Thread darm0k

At 10:18 AM -0600 01/14/2006, Dyna wrote:

This theft of service bull is nonsense!

	If I buy a subscription to say, MacWorld, then leave it in 
the break room at work for my coworkers to read after I've read it, 
that's sharing, not stealing. If I buy bandwidth from the local 
telco or cable company and let my neighbors have what I don't need, 
that's sharing, not stealing.


	Granted, the telcos and cable industry with their lobbyists 
have managed to persuade congress otherwise, but those laws are 
unenforceable anyway- is anyone doing time in club fed for theft of 
service with their home computer?


Sorry, you're off base.

Sharing a magazine is a one-way product loan.  You get it back, with 
no resources lost.


Sharing an ISP's service uses the ISP's resources.  If you are not 
licensed / authorized to be using the service then it is Theft.


People ARE prosecuted for it.

An example:  Two years ago, we had problems with our Comcast service 
dropping to below v.90 speeds during the evenings.  We complained. 
Comcast investigated and determined there are more people on the drop 
than were paying.  They hunted the two offenders down and filed theft 
charges.  The people were arrested, arraigned, then cut deals - they 
paid fines instead of being tried.  ...Then they threatened to sue us 
because we dropped their names at a home-owners association meeting. 
:)


- Dan.

--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
 -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-14 Thread darm0k

At 10:31 AM -0600 01/14/2006, Howard Katz wrote:


Have I done some signal sniffing?  Sure, I'll bet we all have, just to
see if we could do it.  Did I continue to do so?  Nope--in fact I
tracked down the person who had the open signal in my area and advised
them to encrypt their signal.


Some of our home-owner association folx patrol the neighborhood on 
weekend evenings.  One of the things they look for is warchalks, so 
they can notify the home-owner...


- Dan.

--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
 -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-14 Thread Bruce Johnson


On Jan 14, 2006, at 12:52 AM, Clem Bacani wrote:

Drive around the neighborhood, park your car, open your laptop with  
broadband wireless adapter and presto you are connected online. 
Chances are you will have more than one signal within that area.   
You are not stealing a signal because you are not intruding to  
someone else's property.  Incidentally, the signal is there in the  
air for you to use.


Indeed it is a gray area.


Not everywhere. A man in Florida was arrested recently for doing just  
this.


--
Bruce Johnson

No matter where you go, there you are, B. Banzai


--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
 -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-14 Thread Bruce Johnson


On Jan 14, 2006, at 11:25 AM, [EMAIL PROTECTED] wrote:


At 10:18 AM -0600 01/14/2006, Dyna wrote:

This theft of service bull is nonsense!

	If I buy a subscription to say, MacWorld, then leave it in the  
break room at work for my coworkers to read after I've read it,  
that's sharing, not stealing. If I buy bandwidth from the local  
telco or cable company and let my neighbors have what I don't  
need, that's sharing, not stealing.


Mac World is not providing you with a continuous feed of Macworld.  
You get one magazine a month. When you're reading it, your co-worker,  
(barring the really annoying shoulder surfer ones) can't read it at  
the same time and vice versa.


It's a discrete product, not a service.

Try scanning every MacWorld as they come in and putting them up on  
your web server...see how soon Ziff-Davis' lawyers come a-calling.




	Granted, the telcos and cable industry with their lobbyists have  
managed to persuade congress otherwise, but those laws are  
unenforceable anyway- is anyone doing time in club fed for theft  
of service with their home computer?


Typically what's carried out is civil or misdemeanor actions: pay  
restitution, legal costs, perhaps a fine. They only prosecute as a  
felony in egregious violations.  This is the same as someone without  
cable TV  snaking a cable to their neighbors house,  installing a  
splitter, and getting cable TV for free, something the cable  
companies prosecute for all the time.


Or this, you hire a maid to clean your house, then tell them to go  
clean your neighbors house, too, only you're not going to pay for  
that, you're already paying a monthly maid service fee. Do you really  
think they'll do it?


These are exactly the same legal issues.

--
Bruce Johnson

No matter where you go, there you are, B. Banzai


--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
 -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-14 Thread Dyna
Some of our home-owner association folx patrol the neighborhood on 
weekend evenings.  One of the things they look for is warchalks, so 
they can notify the home-owner...


	Must be nice to live in such an elite neighborhood that you 
can concern yourself with such crime. In my 'hood you don't wander 
about after dark unless you're heavily armed. Warchalks- I wish our 
kids were doing that instead of crack and shooting at each other! 
I've got plenty of bandwidth though, because I'm about the only 
person with cable internet access on my block... the local 
gangbangers are more interested in pirating cable TV.




--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
 -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-14 Thread Amber R.


On 14-Jan-06, at 7:57 AM, Tim Collier wrote:

Right now, as I sit here typing this, if I click on the Airport  
icon, I can see  3 other networks in my area.  2 are secured as is  
mine.  The other, it just calls itself 'linksys' is totally open.   
I have been able to connect to the net with it and get my mail.  I  
wish I knew who this network belonged to, I'd certainly offer to  
help him/her secure it.


Tim


Tim,

I agree the technology has not caught up.  It is unfortunate because  
it seems to have given people  the idea that because there appears to  
be little enforcement, it is okay for them to sit outside people's  
homes and steal their signals.


Regarding the last part of your note - when I was visiting my dad  
over Christmas,  I obtained permission from his ISP to temporarily  
use his cable internet connection.  However,  when I opened my  
Powerbook to check some websites,  the network Linksys popped up  
instead.  I changed to my dad's network immediately.  I am not sure  
who the Linksys network belonged to but had been able to sort it out,  
I would have gone and advised them and suggested a way to secure it.


Amber

--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
 -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-14 Thread John Siple


On Jan 14, 2006, at 8:31 AM, Howard Katz wrote:

There's a difference between sitting outside a public library that
offers free internet (with the permission and understanding of their
service provider) and sitting outside someone's home and accessing a
wifi signal that wasn't locked down.  To say there isn't, or that just
because it's there and you can use it, is just rationalization of
theft.  If the laws change to allow that, fine, but 1) the laws aren't
written that way, and 2) with the vested interests that the service
providers have in selling service, they probably won't be.

Have I done some signal sniffing?  Sure, I'll bet we all have, just to
see if we could do it.  Did I continue to do so?  Nope--in fact I
tracked down the person who had the open signal in my area and advised
them to encrypt their signal.  At that point it's their
responsibility.l

My Airport widget tells me there's 2 WEP signals nearby--at least
these folk know how to turn their security settings on.  :)


Later..Howard

--

Is there a difference then between someone who knows how to turn  
security on and someone who doesn't if they both have open networks?  
I kind of like the idea of leaving mine unencrypted. I'm a bit of a  
commy nist at heart. I haven't left it open because I'm too dumb to  
set a password.


And maybe my ISP will come after me some day. But as long as there's  
a marketplace out there I can drop them. The reality of the  
marketplace is that no ISP is going to find it worthwhile to chase  
down it's subscribers who don't encrypt. They want more customers,  
not fewer.


For a prime example of what's really happening take a war drive  
through a college campus. You'll find more open and encrypted  
networks than your screen can scroll through. If service providers  
wanted to hunt down malefactors they could do it easily. So far the  
only example of a theft of services trial was the result of a guy who  
noticed that there was a neighbor parked in front of his house all  
the time and when the home owner asked him to stop he didn't. So the  
homeowner called the cops.


It's a bit like the laws about copyright infringement on music CDs.  
Is there anyone out there who hasn't burned a music CD for a friend  
or relative? Like the service thing I much prefer paying for my music  
and I like having the real thing when it's a bit of art I really  
enjoy. I even like the idea that I'm sending money to the artist.  
Allows him to keep making music. But the idea of copy protection for  
CDs is just laughable. Nobody listens, not the industry and not the  
consumers. Even been through Camden Yard in London? They actually  
sell green discs in public and nobody stops them.


J

--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
 -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-14 Thread darm0k

At 1:01 PM -0800 01/14/2006, John Siple wrote:
Is there a difference then between someone who knows how to turn 
security on and someone who doesn't if they both have open networks?


An interesting question!

The latter can plead ignorance, to the ISP.  The former cannot.  Then 
it's up to the ISP to decide what to do (apply penalty, press 
charges, etc).


I kind of like the idea of leaving mine unencrypted. I'm a bit of a 
commy nist at heart. I haven't left it open because I'm too dumb to 
set a password.


Me too (when I have a WAP here for testing).  But I leave it open for 
nefarious purposes... When I see someone has connected, I try to 
reach into their computer. ;)


For a prime example of what's really happening take a war drive 
through a college campus. You'll find more open and encrypted 
networks than your screen can scroll through. If service providers 
wanted to hunt down malefactors they could do it easily.


I think they have to strike a balance... The cost of the lost 
bandwidth vs the cost of the hunt vs the payback and bad press 
nailing your customers generates.


It's a bit like the laws about copyright infringement on music CDs. 
Is there anyone out there who hasn't burned a music CD for a friend 
or relative? Like the service thing I much prefer paying for my 
music and I like having the real thing when it's a bit of art I 
really enjoy. I even like the idea that I'm sending money to the 
artist. Allows him to keep making music.


I agree.  But there's a big diff between sharing a copy or two with a 
friend or relative, and sharing thousands of copies to the world at 
large.


I think the same things applies to ISPs.  I doubt they fret over the 
open WAP where someone shares access periodically to their broke 
neighbor.  It's the ones that facilitate the neighbor's 
bandwidth-sucking p2p server, or the spammer, or ...


- Dan.

--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
 -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-14 Thread bobgir2004
 Personally, I do not bother with WEP, but I keep MAC address
 filtering on.

Brian - 

When I saw your post, I went to my Linksys BEFSR41 Router, v.3; firmware
version 1.05.00 and checked under the Security tab.

I found the following choices and their settings:

Block Anonymous Internet Requests:  Enabled.

Filter Multicast:  Disabled.

Filter Internet NAT Redirection:  Disabled.

Are these properly set?

Thanks,
bob



-- 
G-Books is sponsored by http://lowendmac.com/ and...

 Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
 -- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

  Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
  -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-14 Thread bobgir2004
 Drive around the neighborhood, park your car, open your laptop with
 broadband wireless adapter and presto you are connected online.
 Chances are you will have more than one signal within that area.  You
 are not stealing a signal because you are not intruding to someone
 else's property.  Incidentally, the signal is there in the air for
 you to use.
 
 Indeed it is a gray area.

I did this once when I was making several deliveries in several
neighborhoods. 

Airport _always_ found some network or other wide open.  I just loaded a
web page from Apple to see if it worked and it always did.  I was stunned!

bob



-- 
G-Books is sponsored by http://lowendmac.com/ and...

 Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
 -- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

  Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
  -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-14 Thread Amber R.


I think the same things applies to ISPs.  I doubt they fret over  
the open WAP where someone shares access periodically to their  
broke neighbor.  It's the ones that facilitate the neighbor's  
bandwidth-sucking p2p server, or the spammer, or ...


- Dan.


Hello Dan,

I agree - My ISP  didn't seem too alarmed at all when I discussed the  
fact that my neighbour was attempting to get onto my connection.   
However, he was very quick to warn that were I to allow this to  
happen that I could be held responsible for everything she or her  
network analyst brother did on-line.   Should he be the type to  
download thousands of child porn files or engage an undercover  
officer in a chat about sex with a minor,  I would be the one  
explaining myself when the police came to the door with a search  
warrant and seized all my stuff - just as Bob suggested.


I could face charges and at least temporary seizure of my computers  
and all my hard drives - not to mention the possibility of being  
arrested and taken to the police station.   No thank you !!


My neighbour was back at my door this AM asking again (third time  
this past week)  for access and the WEP password.  She was extremely  
ticked off when I informed that I was still not interested or  
comfortable with giving her access, then said her brother was going  
to be coming by to deal with me later.


So,  I have taken the router off-line for now and am just staying  
wired directly to the cable modem until this situation settles down a  
little.


Amber




--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
 -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-14 Thread Shawn Harley

Amber,

Sounds like you should return the favor with a visit to your  
neighbor (along with a member of the local law enforcement community)  
to explain your position and let her try out her implied strong arm  
tactic (regarding her brother dealing with you) on your new found  
friend.


I would not put up with crap like that, and would make it clear that  
she and her brother understood that. Plus, it gives you a documented  
record in case he does hack into your network illegally.


Shawn


On Jan 14, 2006, at 7:14 PM, Amber R. wrote:


My neighbour was back at my door this AM asking again (third time  
this past week)  for access and the WEP password.  She was  
extremely ticked off when I informed that I was still not  
interested or comfortable with giving her access, then said her  
brother was going to be coming by to deal with me later.





--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished  
Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on  
Sale!  |


 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
 -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---





--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
 -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-14 Thread darm0k

At 4:14 PM -0800 01/14/2006, Amber R. wrote:


My neighbour was back at my door this AM asking again (third time 
this past week)  for access and the WEP password.  She was extremely 
ticked off when I informed that I was still not interested or 
comfortable with giving her access,


That is one persistant neighbor!


then said her brother was going to be coming by to deal with me later.


Deal with you?

I really don't like this.  Sounds to me like there needs to be a cop 
sitting in your kitchen drinking coffee when he gets there.


Please, be careful.

- Dan.

--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
 -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-14 Thread MTH

Arguing this issue is a waste of bandwith, minds will not be changed.



700MHz iBook G3
640MB Ram
OS 10.3.9

Laugha while you can monkeyboy.
  Dr. Lizardo(Bukaroo Bonzai)



--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
 -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-14 Thread Lawrence Sica


On Jan 14, 2006, at 8:18 PM, [EMAIL PROTECTED] wrote:



then said her brother was going to be coming by to deal with me  
later.


Deal with you?

I really don't like this.  Sounds to me like there needs to be a  
cop sitting in your kitchen drinking coffee when he gets there.


Please, be careful.



Yah.  At this point it is becoming harrasment.  I'd call the cops or  
have someone you know that happens to be a rather large guy be  
there.  They seem to be a little to interested in getting you to say  
yes now.  It's rather strange.


--Larry

--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
 -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-14 Thread macnifico

Hi, Listers!

After reading all those theft of service dire warnings, unenforsable 
(sp.?) in my view, and considering that I live in Mexico, just across 
the border from Texas, I went to see the top engineer in my Cable 
Company Internet Division. The official line:
I can have 5 computers connected via the Ethernet ports, and up to 24 
via Wireless.

So to me closing or opening my Wi-Fi transmiter (sp?.) is a moot point.
After 2 years of having it open, I decided to close it (only registered 
Wi-Fi cards can have access) because I began to worry if someone could 
be using it to do some nefarious thing, so now, sadly, my network is closed.
I liked the idea of givinf free access to anyone living in the range of 
my signal, or parking near my apartment. I even met some very nice 
medicine students that way. 2 of them have their cards registered, and 
can come anytime near my apartment to check their mail or work on their 
projects.
I do miss those simpler times when I knew almost all the people in my 
city that had an Internet connection.

Best regards from Reynosa, Tamaulipas, Mexico!
Hugo Diaz

--

The only thing we knew for sure about Henry Porter is that his name
wasn't Henry Porter
Bob Dylan, Brownsville Girl


--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
 -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-14 Thread Brian McEwen


On Jan 14, 2006, at 6:21 PM, bobgir2004 wrote:


Personally, I do not bother with WEP, but I keep MAC address
filtering on.


Brian -

When I saw your post, I went to my Linksys BEFSR41 Router, v.3;  
firmware

version 1.05.00 and checked under the Security tab.

I found the following choices and their settings:

Block Anonymous Internet Requests:  Enabled.

Filter Multicast:  Disabled.

Filter Internet NAT Redirection:  Disabled.

Are these properly set?

Thanks,
bob


Well they are set properly, but they have little to do with security-  
or at least, limiting access related to sharing of a wireless  
connection.  These setting help filter incoming requests/attacks as  
well as deal with some internal redirection things that don't really  
matter unless you are running an internal gaming server.


You need to look under wireless/security and turn on MAC address  
filtering and WEP to control these things on a wireless router.
Except, my old BEFSR41 wasn't a wireless router :)  so the  
discussions about MAC filtering and WEP, don't really apply to this  
router or you!


If you aren't running any servers in your house, you can check the  
port forwarding tab and make sure nothing is getting forwarded into  
your LAN, and a BIG thing, is to make sure you set the admin password  
on the router to something only you know, and turn off remote  
administration- some Linksys firmwares were easily hacked and people  
could get admin rights remotely if you had remote administration  
enabled.  Setting a password, turning off remote admin, and making  
sure you check for firmware updates once in a while (you are current  
at the moment for a v3 BEFSR41) are the important things for your  
setup, as I see it.


Hope that helps!

Brian






--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
 -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-14 Thread Amber R.
I have a D-Link wireless router - there are options to change from  
the WEP 128 bit encryption to WPA personal.Would doing this  
create enough of a wall for most people trying to hack in ?


While I have been trying not to  use the wireless router  (given the  
situation with my neighbour that I mentioned earlier today),  I  
really need to have access to it here and there as I have a lot of  
work to get done and cannot easily do it at my computer desk.


I was thinking I could perhaps create another network name and WPA  
and perhaps stay hidden from her brother.


Amber

--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
 -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-14 Thread Concetta Z



Is there anyone out there who hasn't burned a music CD for a friend
or relative?


YES


Of course, many of us stick to a personal code of conduct and do
not justify our actions based on what others might do or not do.
Fortunately, most us do not throw wrappers, make noise, speed around,
nor fail to pay our taxes. We don't do it to set an example. We
simply can't envision doing it any other way.


Couldn't have said it better.


--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
 -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-13 Thread Howard Katz
Since she didn't take no for an answer, you might want to first
contact your local Attorney General's office, and see what could be
done.  I suspect that both your police dept. and internet provider
would be interested in this too--since brother probably has done
this for others.

If it's feasible, you might also either go with a wired router, or
just turn your wifi base station off when not in use--that would deter
her from breaking into your signal and stealing service.

Later.Howard

--
G-Books is sponsored by http://lowendmac.com/ and...

 Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
 -- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

  Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
  -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-13 Thread Larry Sica
On 1/13/06, Amber R. [EMAIL PROTECTED] wrote:

 I told her that I had no interest in this arrangement at all as it is
 obviously illegal and I am also concerned about the security of my
 files.She has shown up a couple of times at my door since then
 saying that her brother is a network analyst and would ensure the
 cable company would never know about her surfing on my connection and

 said all he would need is my WEP password to access it.  Their
 persistence is not only getting annoying, but concerning as well.


Sharing the connection is not illegal.  It will violate the terms of
service most likely though if you knowingly let them share it.  There
is nothing that could get you arrested though.

I wouldn't do it either way though, too many potential problems
letting them onto your network.  Now if they sneak into your network
and use it that is a problem since it would fall under breaking into
your network.  Also they might be liable for stealing of the service
from the provider.

 PS.  It did sort of strike me as odd that even though her brother is
 a Network administrator/analyst, he has not been able to get past the
 WEP password.  Aren't these supposed to be relatively easy to crack
 if you know what you're doing ?


Maybe they don't want to take that route.  That could get them in
legal trouble.   You may want to look into WPA instead of WEP.  It's
much better from a security persepctive, and OS X will support it.

-- Larry
there are three things to cry for in life - things that are lost,
things that are found, and things that are magnificent.~douglas
coupland


[EMAIL PROTECTED]
http://www.roadtobabylon.org
http://www.citruspub.net


--
G-Books is sponsored by http://lowendmac.com/ and...

 Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
 -- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

  Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
  -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-13 Thread Bruce Johnson


On Jan 13, 2006, at 10:09 AM, Larry Sica wrote:




PS.  It did sort of strike me as odd that even though her brother is
a Network administrator/analyst, he has not been able to get past the
WEP password.  Aren't these supposed to be relatively easy to crack
if you know what you're doing ?



Maybe they don't want to take that route.  That could get them in
legal trouble.   You may want to look into WPA instead of WEP.  It's
much better from a security persepctive, and OS X will support it


Only newer powerbooks, with a Airport Express do. I'm, unsure if it's  
supported with third party cards, but it is NOT supported on original  
Airport cards.


You can change your SSID, and not advertise it (see the settings info  
for your particular router) and it won't be easy to get at.


Your neighbor's brother could be simply being polite and not hacking  
your network (which is, btw, illegal, and a federal crime)


Their ongoing persistence, in the face of a simple No is troubling,  
though. If they continue you have the basis of a harassment claim,  
and I'd involve the police if it seems at all likely to escalate.


--
Bruce Johnson

This is the sig who says 'Ni!'


--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
 -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-13 Thread darm0k

At 12:09 PM -0500 01/13/2006, Larry Sica wrote:


Sharing the connection is not illegal.  It will violate the terms of
service most likely though if you knowingly let them share it.  There
is nothing that could get you arrested though.


Sharing an internet connection against your ISP's AUP/TOS *is* 
illegal.  It is Theft Of Services.  Depending on the jurisdiction and 
the $-loss claimed by the ISP, it could even be a felony - chargable 
to both the you (depending on your involvement) and the person doing 
the stealing.


- Dan.

--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
 -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-13 Thread darm0k

On Jan 13, 2006, at 10:09 AM, Larry Sica wrote:

PS.  It did sort of strike me as odd that even though her brother is
a Network administrator/analyst, he has not been able to get past the
WEP password.  Aren't these supposed to be relatively easy to crack
if you know what you're doing ?


WEP is easy to crack in that you can record a session off the air, 
then use some serious computer power to figure out that session's 
key.  That doesn't get you access to your protected WAP.  And it 
doesn't get you access to the SSL-encrypted data within the session 
(https web browser connections, eg).



At 11:33 AM -0700 01/13/2006, Bruce Johnson wrote:
Your neighbor's brother could be simply being polite and not hacking 
your network (which is, btw, illegal, and a federal crime)


Their ongoing persistence, in the face of a simple No is 
troubling, though. If they continue you have the basis of a 
harassment claim, and I'd involve the police if it seems at all 
likely to escalate.


IMO, set your passwords and let 'em hack you if they can.  Just check 
your router's DHCP table periodically to see if they're talking. 
That MAC address it records will be your evidence for when you turn 
'em in.


- Dan.

--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
 -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-13 Thread Brian McEwen


On Jan 13, 2006, at 11:09 AM, Amber R. wrote:

I told her that I had no interest in this arrangement at all as it  
is obviously illegal and I am also concerned about the security of  
my files.She has shown up a couple of times at my door since  
then saying that her brother is a network analyst and would ensure  
the cable company would never know about her surfing on my  
connection and said all he would need is my WEP password to access  
it.  Their persistence is not only getting annoying, but concerning  
as well.




There's no way (IMO) that he could guarantee this; anything he puts  
on will have to have a separate MAC address, so that packets get  
routed back to his CPU and not yours.  The MAC address gets tracked,  
ISPs can tell how many CPUs are using a given connection if they wish  
to bother.  Will the cable company ever know that one wireless CPU is  
in your house and one is next door, connecting thru the same router?   
Not unless they come in and physically see what CPU is physically not  
in your house.


Currently,  I have turned the router off and just have the cable  
modem going directly into the PB but this is really an  
inconvenience to me as the whole idea of buying the router was so  
that I could use my PB anywhere in my place.


I would really like to know if there are any  measures I can take  
to protect my connection so they cannot access it and to ensure my  
files are safe.




All wireless is hackable, it's a question of if it is worth it to  
bother or not.


PS.  It did sort of strike me as odd that even though her brother  
is a Network administrator/analyst, he has not been able to get  
past the WEP password.  Aren't these supposed to be relatively easy  
to crack if you know what you're doing ?


On a non-Apple CPU, it is not hard, there is software now that can do  
predictive attacks on the key that can often find the right key in a  
matter of seconds (WEP keys anyway).  At most it's a matter of  
collecting a few hundred thousand packets via sniffing then working  
with the collection.  (Airport cards cannot be put into promiscuous  
mode, which is needed to monitor packets that are not yours, so Macs  
need a 3rd party card to do this- but it's much easier for most  
regular computers).  For all the hype, though, you are not likely to  
be victimized by this.


If you wish to go whole-hog:

-Keep your WEP on (or WPA if you have it in the router AND all your  
computers support it).
-Turn on MAC address filtering, and allow access to only your  
computer.  The MAC address is a long ID string, specific to a given  
ethernet card.


and just keep an eye on your router logs.  If they hack in (not  
likely, media people talk about it a lot but it's not common), you'll  
see their CPU and MAC address in your router access (DHCP) table, and  
you can totally block access to them via you router config.  They'd  
have to change their MAC address on their CPU to get in at that point  
(which is possible but again, not common).


If someone were being bad, you would see them in your router table  
that lists connecting MAC addresses (my routers have all always shown  
that anyway, but I don't use Apple ones), and you can then blacklist  
them.


In fact, you could open it up for a day/week (long enough to let them  
find it and rejoice), note their computers MAC ID, and then blacklist  
them :)


Personally, I do not bother with WEP, but I keep MAC address  
filtering on.  I figure if someone wants in, WEP will not stop them,  
so there's not a point to bothering with it.   They'd have to clone  
my MAC address to get in, which is a pain and they'd have poor  
connectivity as packets would get lost (I think).  I'd still see them  
in my logs as I'd notice connections when I wasn't online via  
wireless, and I could deny them access and change my own ID to let me  
stay in (repeat as needed).


But of course, there isn't anyone doing any of this, at least on my LAN.

HTH.

Brian


--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
 -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-13 Thread Gerald Buc


On Jan 13, 2006, at 2:47 PM, [EMAIL PROTECTED] wrote:


At 12:09 PM -0500 01/13/2006, Larry Sica wrote:


Sharing the connection is not illegal.  It will violate the terms of
service most likely though if you knowingly let them share it.  There
is nothing that could get you arrested though.


Sharing an internet connection against your ISP's AUP/TOS *is* 
illegal.  It is Theft Of Services.  Depending on the jurisdiction and 
the $-loss claimed by the ISP, it could even be a felony - chargable 
to both the you (depending on your involvement) and the person doing 
the stealing.


- Dan.


Is it illegal if I'm visiting a person and log on with my PowerBook?
Or if 2 unrelated persons are sharing an apartment, is it illegal for 
both to utilize the service?

Seems like a gray legal area.

Jerry


--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
 -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-13 Thread darm0k

At 8:34 PM -0600 01/13/2006, Gerald Buc wrote:

On Jan 13, 2006, at 2:47 PM, [EMAIL PROTECTED] wrote:

At 12:09 PM -0500 01/13/2006, Larry Sica wrote:


Sharing the connection is not illegal.  It will violate the terms of
service most likely though if you knowingly let them share it.  There
is nothing that could get you arrested though.


Sharing an internet connection against your ISP's AUP/TOS *is* 
illegal.  It is Theft Of Services.  Depending on the jurisdiction 
and the $-loss claimed by the ISP, it could even be a felony - 
chargable to both the you (depending on your involvement) and the 
person doing the stealing.


Is it illegal if I'm visiting a person and log on with my PowerBook?
Or if 2 unrelated persons are sharing an apartment, is it illegal 
for both to utilize the service?

Seems like a gray legal area.


Not gray at all.  Service is typically sold to a specific household 
or address, and names a responsible party/human.  If you be in that 
household/address, it's legit for you to use it.  ...By analogy - 
it's ok to use your neighbor's phone while you're standing in his 
kitchen, but it's not ok for you to sneak a line thru his window to 
hijack his signal.


In my first reply, I clarified with against your ISP's AUP/TOS - 
that's the critical point.  Give yours a read.  Most residential 
services have explicit no-sharing-beyond-your-premisis clauses.  Some 
business grade services permit limited sharing.  Full off-premisis 
sharing is usually only permitted when you get into larger business 
or ISP-level contracts.


- Dan.

--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
 -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---



Re: security re: file sharing/networks

2006-01-13 Thread Clem Bacani
Drive around the neighborhood, park your car, open your laptop with  
broadband wireless adapter and presto you are connected online. 
Chances are you will have more than one signal within that area.  You  
are not stealing a signal because you are not intruding to someone  
else's property.  Incidentally, the signal is there in the air for  
you to use.


Indeed it is a gray area.



On Jan 13, 2006, at 11:38 PM, [EMAIL PROTECTED] wrote:


At 8:34 PM -0600 01/13/2006, Gerald Buc wrote:

On Jan 13, 2006, at 2:47 PM, [EMAIL PROTECTED] wrote:

At 12:09 PM -0500 01/13/2006, Larry Sica wrote:


Sharing the connection is not illegal.  It will violate the  
terms of
service most likely though if you knowingly let them share it.   
There

is nothing that could get you arrested though.


Sharing an internet connection against your ISP's AUP/TOS *is*  
illegal.  It is Theft Of Services.  Depending on the jurisdiction  
and the $-loss claimed by the ISP, it could even be a felony -  
chargable to both the you (depending on your involvement) and the  
person doing the stealing.


Is it illegal if I'm visiting a person and log on with my PowerBook?
Or if 2 unrelated persons are sharing an apartment, is it illegal  
for both to utilize the service?

Seems like a gray legal area.


Not gray at all.  Service is typically sold to a specific household  
or address, and names a responsible party/human.  If you be in that  
household/address, it's legit for you to use it.  ...By analogy -  
it's ok to use your neighbor's phone while you're standing in his  
kitchen, but it's not ok for you to sneak a line thru his window to  
hijack his signal.


In my first reply, I clarified with against your ISP's AUP/TOS -  
that's the critical point.  Give yours a read.  Most residential  
services have explicit no-sharing-beyond-your-premisis clauses.   
Some business grade services permit limited sharing.  Full off- 
premisis sharing is usually only permitted when you get into larger  
business or ISP-level contracts.


- Dan.

--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished  
Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on  
Sale!  |


 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
 -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---




--
G-Books is sponsored by http://lowendmac.com/ and...

Small Dog Electronicshttp://www.smalldog.com  | Refurbished Drives |
-- Check our web site for refurbished PowerBooks  |   CDRWs on Sale!  |

 Support Low End Mac http://lowendmac.com/lists/support.html

G-Books list info:  http://lowendmac.com/lists/g-books.html
 -- AOL users, remove mailto:;
Send list messages to:  mailto:G-Books@mail.maclaunch.com
To unsubscribe, email:  mailto:[EMAIL PROTECTED]
For digest mode, email: mailto:[EMAIL PROTECTED]
Subscription questions: mailto:[EMAIL PROTECTED]
Archive: http://www.mail-archive.com/g-books%40mail.maclaunch.com/



---
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---