On Jan 13, 2006, at 11:09 AM, Amber R. wrote:
I told her that I had no interest in this arrangement at all as it
is obviously illegal and I am also concerned about the security of
my files. She has shown up a couple of times at my door since
then saying that her brother is a network analyst and would ensure
the cable company would never know about her surfing on my
connection and said all he would need is my WEP password to access
it. Their persistence is not only getting annoying, but concerning
as well.
There's no way (IMO) that he could guarantee this; anything he puts
on will have to have a separate MAC address, so that packets get
routed back to his CPU and not yours. The MAC address gets tracked,
ISPs can tell how many CPUs are using a given connection if they wish
to bother. Will the cable company ever know that one wireless CPU is
in your house and one is next door, connecting thru the same router?
Not unless they come in and physically see what CPU is physically not
in your house.
Currently, I have turned the router off and just have the cable
modem going directly into the PB but this is really an
inconvenience to me as the whole idea of buying the router was so
that I could use my PB anywhere in my place.
I would really like to know if there are any measures I can take
to protect my connection so they cannot access it and to ensure my
files are safe.
All wireless is hackable, it's a question of if it is worth it to
bother or not.
PS. It did sort of strike me as odd that even though her brother
is a Network administrator/analyst, he has not been able to get
past the WEP password. Aren't these supposed to be relatively easy
to crack if you know what you're doing ?
On a non-Apple CPU, it is not hard, there is software now that can do
predictive attacks on the key that can often find the right key in a
matter of seconds (WEP keys anyway). At most it's a matter of
collecting a few hundred thousand packets via sniffing then working
with the collection. (Airport cards cannot be put into promiscuous
mode, which is needed to monitor packets that are not yours, so Macs
need a 3rd party card to do this- but it's much easier for most
regular computers). For all the hype, though, you are not likely to
be victimized by this.
If you wish to go whole-hog:
-Keep your WEP on (or WPA if you have it in the router AND all your
computers support it).
-Turn on MAC address filtering, and allow access to only your
computer. The MAC address is a long ID string, specific to a given
ethernet card.
and just keep an eye on your router logs. If they hack in (not
likely, media people talk about it a lot but it's not common), you'll
see their CPU and MAC address in your router access (DHCP) table, and
you can totally block access to them via you router config. They'd
have to change their MAC address on their CPU to get in at that point
(which is possible but again, not common).
If someone were being bad, you would see them in your router table
that lists connecting MAC addresses (my routers have all always shown
that anyway, but I don't use Apple ones), and you can then blacklist
them.
In fact, you could open it up for a day/week (long enough to let them
find it and rejoice), note their computers MAC ID, and then blacklist
them :)
Personally, I do not bother with WEP, but I keep MAC address
filtering on. I figure if someone wants in, WEP will not stop them,
so there's not a point to bothering with it. They'd have to clone
my MAC address to get in, which is a pain and they'd have poor
connectivity as packets would get lost (I think). I'd still see them
in my logs as I'd notice connections when I wasn't online via
wireless, and I could deny them access and change my own ID to let me
stay in (repeat as needed).
But of course, there isn't anyone doing any of this, at least on my LAN.
HTH.
Brian
--
G-Books is sponsored by <http://lowendmac.com/> and...
Small Dog Electronics http://www.smalldog.com | Refurbished Drives |
-- Check our web site for refurbished PowerBooks | & CDRWs on Sale! |
Support Low End Mac <http://lowendmac.com/lists/support.html>
G-Books list info: <http://lowendmac.com/lists/g-books.html>
--> AOL users, remove "mailto:"
Send list messages to: <mailto:G-Books@mail.maclaunch.com>
To unsubscribe, email: <mailto:[EMAIL PROTECTED]>
For digest mode, email: <mailto:[EMAIL PROTECTED]>
Subscription questions: <mailto:[EMAIL PROTECTED]>
Archive: <http://www.mail-archive.com/g-books%40mail.maclaunch.com/>
---------------------------------------------------------------
iPod Accessories for Less
at 1-800-iPOD.COM
Fast Delivery, Low Price, Good Deal
www.1800ipod.com
---------------------------------------------------------------