Never mind these people are just not behind hardware firewalls or you'd never see their shares!

I'd love to be doing this kind of thing driving through neighborhoods & dropping a business card on their desktop but have avoid doing do so for fear of prosecution for wifi poaching or some other BS.

It irks me when I see lawyer's offices and others with customer data in non-passworded, shared folders connected to non-WPA/WEP wifi links. Then there is the flip side, write enabled shares where a war driver could just load a phone-home-trojan & drive away.

If it's your data & your livelihood without affecting me, then do as you will, but of course this is just not the case in practice. Must be time to start a gorilla group of hackers and war drivers to force the world to secure, we can call ourselves USAF - the United Security Awareness Front and hold the world ransom for... 1 million dollars!

(sorry, AMP kicking in)


Wayne Johnson wrote:
<snip>
alt.binaries.hacking.websites. There are scripts that make this hacking stuff easy. One local ISP hired an outside consultant that ran a program every 24hrs that sent out notices to people's desktops telling them they hadn't used a password on their shares so that whenever a new unprotected system came on line without the proper protection usually the next morning they had a rude surprise waiting for them. He still didn't know which systems were unprotected because he sent out the notices to a whole sub net but he could have & then focusing his attacks on those systems with the point being even a poor pwd is better than none. Why pick a lock when the door is wide open? Heck, they may as well place a welcome sign out if they don't use PWDs.

<snip>

Reply via email to