Never mind these people are just not behind hardware firewalls or you'd
never see their shares!
I'd love to be doing this kind of thing driving through neighborhoods &
dropping a business card on their desktop but have avoid doing do so for
fear of prosecution for wifi poaching or some other BS.
It irks me when I see lawyer's offices and others with customer data in
non-passworded, shared folders connected to non-WPA/WEP wifi links. Then
there is the flip side, write enabled shares where a war driver could
just load a phone-home-trojan & drive away.
If it's your data & your livelihood without affecting me, then do as you
will, but of course this is just not the case in practice. Must be time
to start a gorilla group of hackers and war drivers to force the world
to secure, we can call ourselves USAF - the United Security Awareness
Front and hold the world ransom for... 1 million dollars!
(sorry, AMP kicking in)
Wayne Johnson wrote:
<snip>
alt.binaries.hacking.websites. There are scripts that make this hacking
stuff easy. One local ISP hired an outside consultant that ran a program
every 24hrs that sent out notices to people's desktops telling them they
hadn't used a password on their shares so that whenever a new
unprotected system came on line without the proper protection usually
the next morning they had a rude surprise waiting for them. He still
didn't know which systems were unprotected because he sent out the
notices to a whole sub net but he could have & then focusing his attacks
on those systems with the point being even a poor pwd is better than
none. Why pick a lock when the door is wide open? Heck, they may as well
place a welcome sign out if they don't use PWDs.
<snip>