Well, if you are sitting outside of Lowe's aiming a vagi at the building it really can't be seen as accidental, but yeah. On a tangent, there is a *nix program out there that creates a AP with the same name as access point foo and acts as a proxy to the "real" AP - the premise is that wireless zero conf will switch over people's connections to hit the fake AP (stronger signal strength is kind of a requirement, but. . .) so you can snag usernames and passwords and other such interesting stuff. The name escapes me.
-----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of [EMAIL PROTECTED] Sent: Thursday, July 01, 2004 9:41 AM To: [EMAIL PROTECTED] Subject: Re: [nycwireless] Confessions of a War Driver This is a good point ... Joe Hacker's claim ... "Microsoft made me do it." Ive already personally seen it, people running around surfing the web and checking their personal setting to find out their are connected to Linksys vs. nycwireless.org ... kinda makes you wonder about the right people to really blame. - Jon > >I would suggest that if you deploy wireless network which has open auth > >by design that it's not illegal to associate with the access points. > > Wireless zero config might connect you automatically. -- pgp key: http://www.jonbaer.net/jonbaer.asc fingerprint: F438 A47E C45E 8B27 F68C 1F9B 41DB DB8B 9A0C AF47 -- NYCwireless - http://www.nycwireless.net/ Un/Subscribe: http://lists.nycwireless.net/mailman/listinfo/nycwireless/ Archives: http://lists.nycwireless.net/pipermail/nycwireless/ -- NYCwireless - http://www.nycwireless.net/ Un/Subscribe: http://lists.nycwireless.net/mailman/listinfo/nycwireless/ Archives: http://lists.nycwireless.net/pipermail/nycwireless/
