-
Content
10,155 -
Joined
-
Last visited
-
Days Won
3 -
Feedback
0%
Content Type
Profiles
Forums
Calendar
Dropzones
Gear
Articles
Fatalities
Stolen
Indoor
Help
Downloads
Gallery
Blogs
Store
Videos
Classifieds
Everything posted by Slappie
-
Hell YA!! \m/ \m/ "Find out just what any people will quietly submit to and you have found out the exact measure of injustice and wrong which will be imposed upon them."
-
Mooching WiFi Lots of good links in the article if you visit the ZDnet website to read it. The recent arrest of a Florida man on charges of unauthorized use of a wireless network could set legal ground rules for open Wi-Fi access. A man sitting in a Chevy Blazer in a residential neighborhood reportedly was poking around nearby wireless networks in violation of computer crime laws, according to local police. This appears to be the first arrest in which the sole offense was allegedly accessing a wireless network without prior authorization, and it's already being viewed as a probable test case. CNET News.com interviewed legal scholars to ask what rules apply to Wi-Fi (also called 802.1x) hot spots. Is it legal to use someone's Wi-Fi connection to browse the Web if they haven't put a password on it? Nobody really knows. "It's a totally open question in the law," says Neal Katyal, a professor of criminal law at Georgetown University. "There are arguments on both sides." That doesn't make much sense. Is there a specific law that regulates Wi-Fi access? Sort of. The primary law is the federal Computer Fraud and Abuse Act. You can read it for yourself, but the important part (check out paragraph (a)(2)) covers anyone who "intentionally accesses a computer without authorization or exceeds authorized access." Nobody knows exactly what that means in terms of wireless connections. The law was written in 1986 to punish computer hacking--and nobody contemplated 802.1x wireless links back then. What do prosecutors think? We asked the U.S. Justice Department on Thursday. A department representative who did not want to be quoted by name said, essentially, that it depends on the details of each case. The representative said in an e-mail exchange: "Whether access is considered authorized can be determined in part by the precise circumstances of access, just as it would be in the physical world. The prosecutor and jury would look at how the access was accomplished and what was done with the access before definitively determining that it was unauthorized." In other words, the representative said, someone sitting in a company's parking lot at 3 a.m. for the sole purpose of network connectivity might be viewed as a lawbreaker. Will we ever get a straight answer? Yes, but expect it to take a while. "This is a problem with the way the legal system works," says Orin Kerr, a law professor at George Washington University who has written a detailed article on unauthorized network access. "Nobody knows how an ambiguous law works until a prosecution is brought and a court decides." Alternatively, Congress could rewrite the Computer Fraud and Abuse Act to clear things up, but nobody expects this to happen anytime soon. How about sharing? Is it legal for me to share my cable modem or DSL connection with my neighbors? In many cases the answer is no. It depends on the wording of your contract with your broadband provider. Many don't want you to share. As far back as 2002, Time Warner Cable was sending warnings to customers with open Wi-Fi access points, and a year later it sued an apartment complex on charges of illicit sharing. Also, AT&T Broadband has acknowledged monitoring customers for "inordinately high" usage. "Our terms of service for Verizon Online DSL customers do prohibit them from sharing their connection," says Verizon spokeswoman Bobbi Henson. "The service is meant for use in one location, which would be their home." Henson adds: "We haven't seen a lot of problems with this, to tell you the truth. Because of the way the DSL network is configured (with one line into each house), sharing doesn't cause us the network problems, frankly, that it can cause for cable. If we were to receive some kind of complaint, like maybe a neighbor calls and says, 'I know my neighbor is sharing my connection and it's making me mad because other neighbors are getting it for free,' we might warn that customer." Do all broadband providers feel the same way? No. DSL provider Speakeasy, for example, doesn't mind wireless sharing. Its policy says: "Speakeasy believes that shared wireless networks are in keeping with our core values of disseminating knowledge, access to information and fostering community..." Should I put a password on my Wi-Fi access point at home? It depends on your own security preferences. If your home computer is properly secured and you're not using your wireless connection for anything sensitive, the biggest reason for adding a password is to prevent strangers from leeching off of your connection. Not everyone uses a password. Some people think it's more social to have an open access point. Rob Carlson, a system administrator in Baltimore has had an open Wi-Fi access point named "public" at his home for years. "Having a router firewall up in front of your connection is probably a vast improvement (over a direct connection to a cable modem or DSL modem) even if the wireless portion is wide open," Carlson says. What happens if someone does something unsavory with my Wi-Fi connection? Can I get in trouble? This is another area of ambiguity. "I don't think you would ever be held vicariously liable for unwittingly allowing someone to use your network even if they're trafficking in child pornography. You're just considered a victim in that case," says Christian Genetski, an information security lawyer at Sonnenschein, Nath and Rosenthal. "It'd be different if you set up your own open relay server and looked the other way while spammers sent billions of messages through your open relay, and you were put on notice and did nothing to stop it." Still, one reason to tighten up your Wi-Fi security is that an open wireless connection can be used for mischief. In September, a California man pleaded guilty to spamming people through open Wi-Fi hot spots. Are state laws about unauthorized access different? Yes, but often not in an important way. Genetski says that "as a general rule, most states model their computer crime laws after (the federal law)." "Find out just what any people will quietly submit to and you have found out the exact measure of injustice and wrong which will be imposed upon them."
-
Well well... here I am scheduling all the doctor visits this is going to take. I kind of put it off. No other reason except lack of funds but I'm sucking it up. I can't go any longer without at least having the teeth pulled and the bone grafts done. I can worry about implants or partial when I get to that point. I have to take the first steps now. I'm leaning towards implants only for the simple fact they're less maintence and last much longer. Was trying to put it off till mid Nov but oh well... Oh yea anyone in the Houston area a oral surgeon and want to cut me a deal? "Find out just what any people will quietly submit to and you have found out the exact measure of injustice and wrong which will be imposed upon them."
-
Well what's the count up too? "Find out just what any people will quietly submit to and you have found out the exact measure of injustice and wrong which will be imposed upon them."
-
Its my Birthday and not a single PM from anyone....
Slappie replied to Viking's topic in The Bonfire
Happy Birthday! Now quit whining. "Find out just what any people will quietly submit to and you have found out the exact measure of injustice and wrong which will be imposed upon them." -
What an awesome movie!! "Find out just what any people will quietly submit to and you have found out the exact measure of injustice and wrong which will be imposed upon them."
-
True, but I didn't get the impression that he had been denied access verbally, either. Could be that just didn't show up in the article (or I missed it). I didn't see it in the article either. Again just because it's not posted, doesn't mean the owner wants you walking all over his land (WiFi in this case). You can argue the owner should have secured his WiFi and didn't. Then you can also argue the defendant was knowingly trespassing on someone elses property. Intent is all they need to convict. Personally I think the dude in the blazer in this article was up to no-good. Specially if he was hanging out around this doctors house surfing the web as long as he did. They didn't put specific times but I'd imagine it was awhile. The guy was probably not just playing chess with his buddies because he didn't have access to the net at home. So this would say he had prior knowledge he was trespassing on someone elses property. Wardriving used to be just for fun. Until coffeeshops and other retail outlets started setting up WiFi networks for customers to use. Now it's a freakin FELONY! "Find out just what any people will quietly submit to and you have found out the exact measure of injustice and wrong which will be imposed upon them."
-
Here we go with the argument again. As far as I knew (before this article & case) it was like a radio signal coming from your neighbors house. Free to listen too as long as you didn't reach into your neighbors house and change the channel. "Find out just what any people will quietly submit to and you have found out the exact measure of injustice and wrong which will be imposed upon them."
-
That statement is a huge can of worms. Just because it's not posted "No Trespasing" doesn't mean the owner of the property wants you on his property. IF there was intent and knowledge of the defendant being somewhere they knew they shouldn't be. Could be enough to convict. "Find out just what any people will quietly submit to and you have found out the exact measure of injustice and wrong which will be imposed upon them."
-
If you're dreaming of zombies and I dream I turn into a zombie. Does this mean you're dreaming about me? "Find out just what any people will quietly submit to and you have found out the exact measure of injustice and wrong which will be imposed upon them."
-
The really sad thing is, you sent a PM to Slappy, but not to me... HAHAHA I have more credibility around here then Remtard! /flex "Find out just what any people will quietly submit to and you have found out the exact measure of injustice and wrong which will be imposed upon them."
-
Or worse... a terrorist harboring suspicious foreigners.... You are just trying to get my thread moved to SC!! Go away you frog-wannabe! "Find out just what any people will quietly submit to and you have found out the exact measure of injustice and wrong which will be imposed upon them."
-
_____________________________ Holy Crap! That there's nice!
-
A probing analysis of Gwen Stefani’s ‘Hollaback Girl’
Slappie replied to Slappie's topic in The Bonfire
Do you really want to probe Gwen Stephani? I'm sure I could come up with much better candidates needing my probe. "Find out just what any people will quietly submit to and you have found out the exact measure of injustice and wrong which will be imposed upon them." -
Frenchy you freak. This person sent me a PM!! Ugh... I'm sorry skynole I can't help you. Wish I could. "Find out just what any people will quietly submit to and you have found out the exact measure of injustice and wrong which will be imposed upon them."
-
Gimme some of dat! "Find out just what any people will quietly submit to and you have found out the exact measure of injustice and wrong which will be imposed upon them."
-
A probing analysis of Gwen Stefani’s ‘Hollaback Girl’
Slappie replied to Slappie's topic in The Bonfire
Ya know WB I dunno if it answers your question. But it was a fun read. "Find out just what any people will quietly submit to and you have found out the exact measure of injustice and wrong which will be imposed upon them." -
you mean to tell me that h2o still falls from the sky? I say you are lying!! Rain is a myth... "Find out just what any people will quietly submit to and you have found out the exact measure of injustice and wrong which will be imposed upon them."
-
Some will argue that women are the root of all evil. I think they are the root to all life. They have the ability to destroy you and they have the ability to make you great. They can remove your heart with the utmost grace and beauty, chew it up, discard its remains and still keep you loving them. They to me are the most beautiful and intriguing creatures put on this earth. They can make me physically sick and they have the ability to make me smile and giggle more than any hallucinogenic ever has. They can take my mind off of the world with a smile and they can comfort my tattered mind with a simple touch. I like the way they smell and feel. I enjoy getting lost in their eyes. I like kissing their necks while holding them from behind. I like the smell of their hair and the softness of their skin. I like the way they can communicate without saying a word. I like to just talk to them and hang out, whether friendly or romantically a life without a woman is like life without music. They are far more beautiful than flowers and far more addictive and dangerous than a heroin binge. My appreciation for them grows daily and I just wanted to thank all of the women that have been in my life past and present, you all have a place in my heart and are appreciated – even if I don’t seem to show it at times. Thank you, thank you all. "Find out just what any people will quietly submit to and you have found out the exact measure of injustice and wrong which will be imposed upon them."
-
Ya I tripped on that to. I couldn't believe it was a felony. Get some anal seepage cause you were cruising around and stumbled upon some dorks open WiFi and decided to send an email to your porn lover. ouch! "Find out just what any people will quietly submit to and you have found out the exact measure of injustice and wrong which will be imposed upon them."
-
Interesting to see this since we've had this conversation here in Bonfire a few times. Wi-Fi cloaks a new breed of intruder Though wireless mooching is preventable, it often goes undetected. By ALEX LEARY, Times Staff Writer Published July 4, 2005 -------------------------------------------------------------------------------- ST. PETERSBURG - Richard Dinon saw the laptop's muted glow through the rear window of the SUV parked outside his home. He walked closer and noticed a man inside. Then the man noticed Dinon and snapped his computer shut. Maybe it's census work, the 28-year-old veterinarian told his girlfriend. An hour later, Dinon left to drive her home. The Chevy Blazer was still there, the man furtively hunched over his computer. Dinon returned at 11 p.m. and the men repeated their strange dance. Fifteen minutes later, Dinon called police. Police say Benjamin Smith III, 41, used his Acer brand laptop to hack into Dinon's wireless Internet network. The April 20 arrest is considered the first of its kind in Tampa Bay and among only a few so far nationwide. "It's so new statistics are not kept," said Special Agent Bob Breeden, head of the Florida Department of Law Enforcement's computer crime division. But experts believe there are scores of incidents occurring undetected, sometimes to frightening effect. People have used the cloak of wireless to traffic in child pornography, steal credit card information and send death threats, according to authorities. For as worrisome as it seems, wireless mooching is easily preventable by turning on encryption or requiring passwords. The problem, security experts say, is many people do not take the time or are unsure how to secure their wireless access from intruders. Dinon knew what to do. "But I never did it because my neighbors are older." A drive through downtown St. Petersburg shows how porous networks can be. In less than five minutes, a Times reporter with a laptop found 14 wireless access points, six of which were wide open. "I'll guarantee there are tons of people out there who have their wireless network being exploited but have no idea," Breeden said. "And as we see more people utilizing wireless, we'll see more people being victimized." Prolific Wi-Fi growth Wireless fidelity, or "Wi-Fi," has enjoyed prolific growth since catching on in 2000. More than 10-million U.S. homes are equipped with routers that transmit high-speed Internet to computers using radio signals. The signals can extend 200 feet or more, giving people like Dinon the ability to use the Web in the back yard of his Crescent Heights home but also reaching the house next door, or the street. Today someone with a laptop and inexpensive wireless card can surf the Web via Wi-Fi at Starbucks or eat a bagel and send instant messages at Panera Bread. Libraries, hotels, airports and colleges campuses are dotted with Wi-Fi "hotspots." Even entire cities are unplugging. "The information age is over. The information is out there," said Jim Guerin, technology director for the city of Dunedin, which will soon be the first city in Florida to go completely Wi-Fi. "Now it's the connectivity age. It opens up a whole new area for ethics, legal boundaries and responsibilities. It's a whole new frontier." There's a dark side to the convenience, though. The technology has made life easier for high-tech criminals because it provides near anonymity. Each online connection generates an Internet Protocol Address, a unique set of numbers that can be traced back to a house or business. That's still the case with Wi-Fi but if a criminal taps into a network, his actions would lead to the owner of that network. By the time authorities show up to investigate, the hacker would be gone. "Anything they do traces back to your house and chances are we're going to knock on your door," Breeden said. Breeden recalled a case a few years ago in which e-mail containing death threats was sent to a school principal in Tallahassee. The e-mail was traced back to a home, and when investigators arrived, they found a dumbfounded family. The culprit: a neighborhood boy who had set up the family's Wi-Fi network and then tapped into it. In another Florida case, a man in an apartment complex used a neighbor's Wi-Fi to access bank information and pay for pornography sites. But he slipped up. The man had sex products sent to his address. "The morning we did a search warrant, we found an antenna hanging out his window so he could get a better signal from his neighbor's network," Breeden said. Last year, a Michigan man was convicted of using an unsecured Wi-Fi network at a Lowe's home improvement store to steal credit card numbers. The 20-year-old and a friend stumbled across the network while cruising around in a car in search of wireless Internet connections - a practice known as "Wardriving." (The name has roots in the movie WarGames, in which Matthew Broderick's character uses a computer to call hundreds of phone numbers in search of computer dialups, hence "war dialing.") A more recent threat to emerge is the "evil twin" attack. A person with a wireless-equipped laptop can show up at, say, a coffee shop or airport and overpower the local Wi-Fi hotspot. The person then eavesdrops on unsuspecting computer users who connect to the bogus network. At a technology conference in London this spring, hackers set up evil twins that infected other computers with viruses, some that gather information on the user, the Wall Street Journal reported. Not all encryption is rock solid, either. One of the most common methods called WEP, or Wired Equivalent Privacy, is better than nothing but still can be cracked using a program available on the Web. "Anybody with an Internet connection and an hour online can learn how to break that," said Guerin, the Dunedin network administrator. Two years ago when the city of Dunedin first considered Wi-Fi, Guerin squashed the idea because of WEP's inadequacy. Dunedin's network, however, will be protected by the AES encryption standard, used by the Department of Defense. Passwords will be required, and each computer will have to be authenticated by the network. There also will be firewalls. "I'm confident to say our subscribers are at zero risk for that kind of fraud," Guerin said. Leaving the door open Not everyone has sinister intentions. Many Wardrivers do it for sport, simply mapping the connections out there. Others see it as part public service, part business opportunity. When they find an unsecured network, they approach a homeowner and for a fee, offer to close the virtual door. Some Wi-Fi users intentionally leave their networks open or give neighbors passwords to share an Internet connection. There is a line of thought that tapping into the network of a unsuspecting host is harmless provided the use is brief and does not sap the connection, such as downloading large music files. "There is probably some minority of people who hop on and are up to no good. But I don't know there is any sign it's significant," said Mike Godwin of Public Knowledge, a public interest group in Washington, D.C., focused on technology. "We have to be careful," Godwin said. "There's a lot of stuff that just because it's new triggers social panic. Normally the best thing to do is sit back and relax and let things take their course ... before acting on regulation." Randy Cohen, who writes "The Ethicist" column in the New York Times Magazine , was swayed by Godwin's thinking. When asked by a Berkeley, Calif., reader if it was okay to hop on a neighbor's Wi-Fi connection, Cohen wrote: "The person who opened up access to you is unlikely even to know, let alone mind, that you've used it. If he does object, there's easy recourse: nearly all wireless setups offer password protection." But, Cohen went on to ask, "Do you cheat the service provider?" Internet companies say yes. "It's no different if I went out and bought a Microsoft program and started sharing it with everyone in my apartment. It's theft," said Kena Lewis, spokeswoman for Bright House Networks in Orlando. "Just because a crime may be undetectable doesn't make it right." "I'll probably never know' In a way Dinon was fortunate the man outside his home stuck around since it remains a challenge to catch people in the act. Smith, who police said admitted to using Dinon's Wi-Fi, has been charged with unauthorized access to a computer network, a third-degree felony. A pretrial hearing is set for July 11. It remains unclear what Smith was using the Wi-Fi for, to surf, play online video games, send e-mail to his grandmother, or something more nefarious. Prosecutors declined to comment, and Smith could not be reached. "I'm mainly worried about what the guy may have uploaded or downloaded, like kiddie porn," Dinon said. "But I'll probably never know." --Times staff writer Matthew Waite contributed to this report. Alex Leary can be reached at 727 893-8472 or leary@sptimes.com MINIMIZING THE RISKS Here are a few tips to minimize potential threats to a Wi-Fi network: Enable WEP (Wired Equivalent Privacy). Even though WEP uses weak encryption and is breakable, it still provides an effective first measure of defense by encrypting the traffic between your wireless card and access point. Use 64-bit WEP to gain some security benefit without slowing down your network unnecessarily. You can also use WPA, a similar security protocol that's tougher to crack. Make sure both your access point and card support it. Change your SSID (service set identifier) to something nondescriptive. You do not want to give out your name, address, or any other useful information to potential hackers. Also, don't use the default SSID. Change the default password on your access points. The defaults of most network equipment are well known. Enable MAC based filtering. Using this feature, only your unique wireless cards can communicate with your access point. Turn off your access points when you are not using them. Why risk being scanned or being broken into if you are not using your wireless network? Position your access points toward the center of your house or building. This will minimize the signal leak outside of its intended range. If you are using external antennas, selecting the right type of antenna can be helpful in minimizing signal leak. Don't send sensitive files over Wi-Fi networks. Most Web sites that perform sensitive transactions like shopping with a credit card or checking bank account information use Secure Socket Layer (SSL) technology. Sources: Force Field Wireless, www.forcefieldwireless.com TampaBay.com columnist Jeremy Bowers. "Find out just what any people will quietly submit to and you have found out the exact measure of injustice and wrong which will be imposed upon them."
-
A probing analysis of Gwen Stefani’s ‘Hollaback Girl’
Slappie replied to Slappie's topic in The Bonfire
Hey I didn't write it! I shamelessly stole it... "Find out just what any people will quietly submit to and you have found out the exact measure of injustice and wrong which will be imposed upon them." -
Ok Erkkk you've been spammed "Find out just what any people will quietly submit to and you have found out the exact measure of injustice and wrong which will be imposed upon them."
-
Oh and I found one last one before it moved onto spelling my name "Sean" I have my own website!! http://www.shawn-collins.com/home.html I'm awesome! "Find out just what any people will quietly submit to and you have found out the exact measure of injustice and wrong which will be imposed upon them."
-
I have outsourcing consulting firm http://www.affiliatemanager.net/scc/index.shtml I've got ALOT of attention on the web as this guy. I am a visual designer also http://www.groundfreeze.com/ Pretty neat stuff. I think this ones a lie.. Assistant professor, FRANÇAIS Ph.D.: University of Ottawa (2001) http://www.chimie.umontreal.ca/profs/angl_CollinsShawn.htm I don't speak FRENCH!! I played pro ball from 89-93 with Atl. http://www.pro-football-reference.com/players/CollSh00.htm Pretty creepy seeing your name attached to someone else. They've even got the same birth year as me! Last but not least, I'm a lawyer!! http://www.collinslaw.com/bios/collins.html "Find out just what any people will quietly submit to and you have found out the exact measure of injustice and wrong which will be imposed upon them."