At 6:00 PM -0800 01/13/2006, John Siple wrote:
There are a few considerations here. I've thought about this a bit.
I have a neighbor who is running an unencrypted network. I
sometimes log on to see if network problems are because of my ISP or
because of my hardware. Mostly my connection is
At 11:52 PM -0800 01/13/2006, Clem Bacani wrote:
Drive around the neighborhood, park your car, open your laptop with
broadband wireless adapter and presto you are connected online.
Chances are you will have more than one signal within that area.
You are not stealing a signal because you are
On 13-Jan-06, at 11:52 PM, Clem Bacani wrote:
Drive around the neighborhood, park your car, open your laptop with
broadband wireless adapter and presto you are connected online.
Chances are you will have more than one signal within that area.
You are not stealing a signal because you
I totally agree on this one. I don't think the laws have caught up with the
technology yet. It's a matter of the (restating the obvious) the technology
having advanced so fast that legislation has not been able to act on the
legality of intrusion into somebody else's home network. Yes, a lot
Is it illegal if I'm visiting a person and log on with my PowerBook?
Or if 2 unrelated persons are sharing an apartment, is it illegal
for both to utilize the service?
Seems like a gray legal area.
Jerry
You will find that there usually is not a gray area at all if you
read the TOS (
This theft of service bull is nonsense!
If I buy a subscription to say, MacWorld, then leave it in
the break room at work for my coworkers to read after I've read it,
that's sharing, not stealing. If I buy bandwidth from the local telco
or cable company and let my neighbors have what
There's a difference between sitting outside a public library that
offers free internet (with the permission and understanding of their
service provider) and sitting outside someone's home and accessing a
wifi signal that wasn't locked down. To say there isn't, or that just
because it's there and
On 14-Jan-06, at 8:18 AM, Dyna wrote:
This theft of service bull is nonsense!
If I buy a subscription to say, MacWorld, then leave it in the
break room at work for my coworkers to read after I've read it,
that's sharing, not stealing. If I buy bandwidth from the local
telco or
Howard and Amber, perhaps my age is showing here, and the
fact that I don't work in the computer biz. I was raised in the day
when you were expected to pay for things like new books, bicycles,
etc But once you'd bought them they were yours and you could loan
or give your magazine or
I've also recently noticed a LinkSys open network, and I'd like to
know who it is so I could offer to help. I'm also surprised, since
our house is several hundred feet away from the nearest neighbor. I
guess they installed a high-gain antenna.
I also use a (directional) high-gain antenna
You hit the nail in the head. You are the modern day Robin Hood.
On Jan 14, 2006, at 9:33 AM, Dyna wrote:
Howard and Amber, perhaps my age is showing here, and the fact
that I don't work in the computer biz. I was raised in the day when
you were expected to pay for things like new books,
At 8:17 AM -0800 01/14/2006, Amber R. wrote:
Of course, I am sure there are hundreds of people who visit friends
with wireless connections and just open up their laptops and surf.
Is it legal ? again depends on the ISP TOS, but there can be serious
consequences.
i.e. The person paying for
At 10:18 AM -0600 01/14/2006, Dyna wrote:
This theft of service bull is nonsense!
If I buy a subscription to say, MacWorld, then leave it in
the break room at work for my coworkers to read after I've read it,
that's sharing, not stealing. If I buy bandwidth from the local
telco or
At 10:31 AM -0600 01/14/2006, Howard Katz wrote:
Have I done some signal sniffing? Sure, I'll bet we all have, just to
see if we could do it. Did I continue to do so? Nope--in fact I
tracked down the person who had the open signal in my area and advised
them to encrypt their signal.
Some
On Jan 14, 2006, at 12:52 AM, Clem Bacani wrote:
Drive around the neighborhood, park your car, open your laptop with
broadband wireless adapter and presto you are connected online.
Chances are you will have more than one signal within that area.
You are not stealing a signal because
On Jan 14, 2006, at 11:25 AM, [EMAIL PROTECTED] wrote:
At 10:18 AM -0600 01/14/2006, Dyna wrote:
This theft of service bull is nonsense!
If I buy a subscription to say, MacWorld, then leave it in the
break room at work for my coworkers to read after I've read it,
that's sharing,
Some of our home-owner association folx patrol the neighborhood on
weekend evenings. One of the things they look for is warchalks, so
they can notify the home-owner...
Must be nice to live in such an elite neighborhood that you
can concern yourself with such crime. In my 'hood you don't
Clark,
Right on the money.
For the rest, take a read of the book Icon. Tons of insight into Steve, Apple
and the entire industry.
Ron
On Friday, January 13, 2006, at 04:42AM, Clark Martin [EMAIL PROTECTED] wrote:
At 9:16 PM -0500 1/12/06, [EMAIL PROTECTED] wrote:
Sorry but I see something
Dear G-Book list members,
Over the past couple of weeks, I have noticed that a few people are
quoting massive amounts of unnecessary text in their replies or
replying to a thread that already has multiple lines of quoted text,
and adding their own. This creates quite a confusing tangle
At 4:13 PM -0800 01/13/2006, Clark Martin wrote:
At 3:52 PM -0500 1/13/06, [EMAIL PROTECTED] wrote:
At 5:05 PM +0100 01/13/2006, Francesco sciacca wrote:
In my case, CCC gave several errors claiming not to be able to copy certain
files (all belonging to the System folder, if I remember
On 14-Jan-06, at 7:57 AM, Tim Collier wrote:
Right now, as I sit here typing this, if I click on the Airport
icon, I can see 3 other networks in my area. 2 are secured as is
mine. The other, it just calls itself 'linksys' is totally open.
I have been able to connect to the net with it
On Jan 14, 2006, at 8:31 AM, Howard Katz wrote:
There's a difference between sitting outside a public library that
offers free internet (with the permission and understanding of their
service provider) and sitting outside someone's home and accessing a
wifi signal that wasn't locked down. To
At 1:01 PM -0800 01/14/2006, John Siple wrote:
Is there a difference then between someone who knows how to turn
security on and someone who doesn't if they both have open networks?
An interesting question!
The latter can plead ignorance, to the ISP. The former cannot. Then
it's up to the
So let's quit being paranoid and let some common sense prevail.
Here here.
The law is a very flexible thing folks. If all the laws were strictly
enforced this country would come to a screeching halt. The
underground economy alone is huge. None of those folks on craigslist
are
John Siple wrote:
The law is a very flexible thing folks. If all the laws were strictly
enforced this country would come to a screeching halt. The underground
economy alone is huge. None of those folks on craigslist are paying
their state sales taxes on items sold. Cars speed. My
Run CCC from the admin account, after repairing permissions.
Make sure there are no other apps running.
Dan -
Small point, but worth clarifying.
Do you mean no other apps running or open? Should one shut down
everything when backing up with CCC?
I usually don't touch my Mac
Sharing the connection is not illegal. It will violate the terms of
service most likely though if you knowingly let them share it. There
is nothing that could get you arrested though.
Expand your horizons a bit and consider what would truly be the worst
case scenario, IMHO.
Someone
At 5:53 PM -0500 01/14/2006, bobgir2004 wrote:
Run CCC from the admin account, after repairing permissions.
Make sure there are no other apps running.
Dan -
Small point, but worth clarifying.
Do you mean no other apps running or open?
Running == Open.
Should one shut down
Yeh! it works with xpf. Now, which application will make a bootable
disk image for those other macs that lack the dvd rom. Woooe!
--
G-Books is sponsored by http://lowendmac.com/ and...
Small Dog Electronicshttp://www.smalldog.com | Refurbished Drives |
-- Check our web site for
Personally, I do not bother with WEP, but I keep MAC address
filtering on.
Brian -
When I saw your post, I went to my Linksys BEFSR41 Router, v.3; firmware
version 1.05.00 and checked under the Security tab.
I found the following choices and their settings:
Block Anonymous
Drive around the neighborhood, park your car, open your laptop with
broadband wireless adapter and presto you are connected online.
Chances are you will have more than one signal within that area. You
are not stealing a signal because you are not intruding to someone
else's property.
Is there a way to back up or copy using CCC on my network?
--
Thanks,
Paul pjspop @ bresnan.net
--
G-Books is sponsored by http://lowendmac.com/ and...
Small Dog Electronicshttp://www.smalldog.com | Refurbished Drives |
-- Check our web site for refurbished PowerBooks | CDRWs on
Yep. Thanks.
On Jan 14, 2006, at 1:41 PM, John Siple wrote:
So let's quit being paranoid and let some common sense prevail.
Here here.
The law is a very flexible thing folks. If all the laws were
strictly enforced this country would come to a screeching halt. The
underground
Hello again G-Book list members,
Please be aware that as a List Nanny, I attempt to maintain a
relatively low profile in general. I am pleased to say that I
participate in this list far more frequently in the capacity as a
list member than I ever have as a list nanny.
However, there
I think the same things applies to ISPs. I doubt they fret over
the open WAP where someone shares access periodically to their
broke neighbor. It's the ones that facilitate the neighbor's
bandwidth-sucking p2p server, or the spammer, or ...
- Dan.
Hello Dan,
I agree - My ISP didn't
Amber,
Sounds like you should return the favor with a visit to your
neighbor (along with a member of the local law enforcement community)
to explain your position and let her try out her implied strong arm
tactic (regarding her brother dealing with you) on your new found
friend.
I
At 4:14 PM -0800 01/14/2006, Amber R. wrote:
My neighbour was back at my door this AM asking again (third time
this past week) for access and the WEP password. She was extremely
ticked off when I informed that I was still not interested or
comfortable with giving her access,
That is one
Arguing this issue is a waste of bandwith, minds will not be changed.
700MHz iBook G3
640MB Ram
OS 10.3.9
Laugha while you can monkeyboy.
Dr. Lizardo(Bukaroo Bonzai)
--
On Jan 14, 2006, at 8:18 PM, [EMAIL PROTECTED] wrote:
then said her brother was going to be coming by to deal with me
later.
Deal with you?
I really don't like this. Sounds to me like there needs to be a
cop sitting in your kitchen drinking coffee when he gets there.
Please, be
Hi, Listers!
After reading all those theft of service dire warnings, unenforsable
(sp.?) in my view, and considering that I live in Mexico, just across
the border from Texas, I went to see the top engineer in my Cable
Company Internet Division. The official line:
I can have 5 computers
On Jan 14, 2006, at 6:21 PM, bobgir2004 wrote:
Personally, I do not bother with WEP, but I keep MAC address
filtering on.
Brian -
When I saw your post, I went to my Linksys BEFSR41 Router, v.3;
firmware
version 1.05.00 and checked under the Security tab.
I found the following
I have a D-Link wireless router - there are options to change from
the WEP 128 bit encryption to WPA personal.Would doing this
create enough of a wall for most people trying to hack in ?
While I have been trying not to use the wireless router (given the
situation with my neighbour
Coincidentally enough, as this thread was developing I found a
neighbouring linksys signal appear in my 'available networks'. Okay - time
to recognize I am not alone out here. Time for WPA! After some research,
downloading and upgrading I got my system secure.
Then I tried to add my printer.
An
Is there anyone out there who hasn't burned a music CD for a friend
or relative?
YES
Of course, many of us stick to a personal code of conduct and do
not justify our actions based on what others might do or not do.
Fortunately, most us do not throw wrappers, make noise, speed around,
nor
Thanks. It is filling up my in-box at alarming speed.
Ron
On Sunday, January 15, 2006, at 00:40AM, Amber R. [EMAIL PROTECTED] wrote:
Hello again G-Book list members,
Please be aware that as a List Nanny, I attempt to maintain a
relatively low profile in general. I am pleased to say that I
45 matches
Mail list logo