Mike,

Sorry, if I could learn to read the question I would answer it 
correctly.  I remember in college taking a Blue Book exam, and 
struggling through the entire thing to only later learn that if I had 
read the instructions from the professor, all I would have had to do is 
read his last instruction to sign my name and turn the blank book back 
into him.  I still haven't learned.

John R.


On Jul 21, 2004, at 10:13 PM, Jerry Yeager wrote:

> What John is telling you as far as password protecting a wireless 
> network is correct, but as you are saying, since you are tied directly 
> into your DSL modem, you do not need to worry about this with one 
> caveat: If your mac has an airport card in and you did have 'share 
> network connection turned on, etc., then it is possible they could 
> hitchhike. The easiest way to stop that in YOUR situation it to turn 
> the airport card off.
>
> If they do not have wireless systems, then the tapping would have to 
> be done by the airport card in the machine (or by physical connections 
> via ethernet into the computer side of the router). or they have to 
> use advanced alien-based technology to interface with the computer, 
> which I doubt they are doing, because DSL lines would not be fast 
> enough for the alines to use to accomplish much (smile).
>
>
> The idea of him using a wireless network like you are saying is called 
> war-driving and war-chalking, etc (you can hit Google for fascinating 
> tales about this thing if you wish).
>
>
>                               Jerry
>
>
> On Jul 21, 2004, at 8:29 PM, Mike Watkins wrote:
>
>> All,
>>
>> Is there anything I need to do to protect my computer's DSL service 
>> from being used by someone outside my home? I do not have a wireless/ 
>> airport type set-up... just a regular BellSouth high speed DSL 
>> conection.
>>
>> There's a kid in our neighborhood who is lurking outside some of my 
>> neighbor's houses to use their internet on his laptop... I've seen 
>> him by two of my neighbor's houses, and that's what he says he's 
>> doing. He told me he didn't think they'd mind. (Of course, they're 
>> not home at the time.) He sat out in front of my next-door neighbor's 
>> for several hours on Monday. She doesn't have a wireless set-up, 
>> either... perhaps he was really tapping into the folks across the 
>> street's system?
>>
>> If he or someone else can access my internet, what are the dangers to 
>> my system? I don't know how skilled he is. If he did anything illegal 
>> using my connection, or if his computer had a virus, or whatever... 
>> what could happen? Would you report him to anyone... and, if so, who?
>>
>> Anyone know about this stuff?
>>
>> Mike
>>
>>
>>
>> | The next meeting of the Louisville Computer Society will
>> | be July 27. The LCS Web page is <http://www.kymac.org>.
>> | List posting address: <mailto:macgroup at erdos.math.louisville.edu>
>> | List Web page: <http://erdos.math.louisville.edu/macgroup>
>>
>>
> -----------------------------------
> Someday, I will come up with a clever signature line. I am not sure if 
> I will use it or not, but I will come up with one.
>
>
>
> | The next meeting of the Louisville Computer Society will
> | be July 27. The LCS Web page is <http://www.kymac.org>.
> | List posting address: <mailto:macgroup at erdos.math.louisville.edu>
> | List Web page: <http://erdos.math.louisville.edu/macgroup>
>



| The next meeting of the Louisville Computer Society will
| be July 27. The LCS Web page is <http://www.kymac.org>.
| List posting address: <mailto:macgroup at erdos.math.louisville.edu>
| List Web page: <http://erdos.math.louisville.edu/macgroup>


Reply via email to