Jump to content

boosting wireless


Andy_1984

Recommended Posts

Presumably if I left my front door unlocked and my wallet on the kitchen table, Andy would think it OK for him to come in and help himself to my wallet and anything else he could find.

 

Or is that just 'A case of moral standards'?

 

Moral standards me thinks plus I doubt Andy mean it like that :)

 

Bluetooth hacking, lol, heard lots about that! Needless to say, I have it turned off all the time unless I'm using it for other things. It's shocking what people are doing with it :o sending txts, making calls - you name it :o

Edited by Emz

- Emz

 

Find out who you live by - www.frappr.com/anfriendsmap

 

Check out Crystal's New Website! :)

Don't forget to sign her guestbook :D

 

 

Link to comment
Share on other sites

  • Replies 22
  • Created
  • Last Reply

Top Posters In This Topic

dont want to argue about this but taking a wallet is diffrent from using their internet, after all they still have it their internet and i havnt took anything away. needless to say i still havnt done anythin yet as i cant be bothered but would be nice to know if it can be done

Owner of Tacklesack.co.uk


Moderator at The-Pikers-Pit.co.uk

Link to comment
Share on other sites

Guest NickInTheNorth

Hi Andy

 

Certainly can be done, but it is theft.

 

You say they still have there internet connection - true. But what they don't have is their full bandwidth allowance, you will have taken some of that.

 

Also, just ponder this, you take a £20 note from someone, spend it, then regret the theft. You replace the £20 note with another one.

 

Have you committed a crime?

Link to comment
Share on other sites

The Theft Act 1968 Section1 (1) states that a person is guilty of theft if: he dishonestly appropriates property belonging to another with the intention of permanently depriving the other of it.

 

The £20 note example is theft under the act above.

 

Connecting to an unsecured wireless connection is theft of bandwidth and of the electricity from the person who owns and maintains the connection.

Link to comment
Share on other sites

No, that is ever so slightly different :)

 

Read the whole article. Although the BBC chose to use the word "hijack" it would appear all he did was access the internet through someone's wifi connection without their permission. He did nothing to their computer.

 

Reading further about this it would now seem absolutely essential to protect your connections. If some paedophile starts downloading kiddie porn via your open connection YOU can be held responsible!!

Link to comment
Share on other sites

Read the whole article. Although the BBC chose to use the word "hijack" it would appear all he did was access the internet through someone's wifi connection without their permission. He did nothing to their computer.

 

Reading further about this it would now seem absolutely essential to protect your connections. If some paedophile starts downloading kiddie porn via your open connection YOU can be held responsible!!

Connecting to an Access Point without permission is a criminal offense Andy. The fact that the access point was running without encryption makes not one iota of difference. (At least not under English Law)

 

It has nothing tp do with 'theft' however. They will prosecute you under the Computer Misuse Act or the Communications Act.

 

As an aside Andy, if one does attach to an unprotected WLAN then all of the traffic you generate will be totally unencrypted and it would be a piece of p!ss for someone like me to read every packet that you send and receive over the insecure connection.

The problem isn't what people don't know, it's what they know that just ain't so.
Vaut mieux ne rien dire et passer pour un con que de parler et prouver que t'en est un!
Mi, ch’fais toudis à m’mote

Link to comment
Share on other sites

As an aside Andy, if one does attach to an unprotected WLAN then all of the traffic you generate will be totally unencrypted and it would be a piece of p!ss for someone like me to read every packet that you send and receive over the insecure connection.

 

Too true. I've actually left mine open deliberately sometimes, amazing what you can find out, even more fun is turning their world around, literally.

 

Ip tables are fun :thumbs::D

- Emz

 

Find out who you live by - www.frappr.com/anfriendsmap

 

Check out Crystal's New Website! :)

Don't forget to sign her guestbook :D

 

 

Link to comment
Share on other sites

Ip tables are fun :thumbs::D

That's being a wee bit wicked emz ;) Remember that running a WAP in unsecured mode could land YOU in hot water too.

The problem isn't what people don't know, it's what they know that just ain't so.
Vaut mieux ne rien dire et passer pour un con que de parler et prouver que t'en est un!
Mi, ch’fais toudis à m’mote

Link to comment
Share on other sites

  • 2 weeks later...
That's being a wee bit wicked emz ;) Remember that running a WAP in unsecured mode could land YOU in hot water too.

 

Indeed, heard it happening quite a few times now :( Genuine innocent people too, just unaware of the risks.

 

Wicked? If you say so :P

 

LOL at the iptables example above :lol::lol::lol:

- Emz

 

Find out who you live by - www.frappr.com/anfriendsmap

 

Check out Crystal's New Website! :)

Don't forget to sign her guestbook :D

 

 

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×
×
  • Create New...

Important Information

We and our partners use cookies on our website to give you the most relevant experience by remembering your preferences, repeat visits and to show you personalised advertisements. By clicking “I Agree”, you consent to the use of ALL the cookies. However, you may visit Cookie Settings to provide a controlled consent.