![]() |
2009-03-08
, 18:01
|
|
Posts: 3,397 |
Thanked: 1,212 times |
Joined on Jul 2008
@ Netherlands
|
#22
|
![]() |
2009-03-08
, 18:06
|
|
Posts: 3,397 |
Thanked: 1,212 times |
Joined on Jul 2008
@ Netherlands
|
#23
|
Ok. As someone who operates a corporate network, let me tell you how this would go.
My access points are routers, running DD-WRT. They're configured for WPA-PSK.
After banging on the network for however long that took, our hero here would finally get connected. And the router would note a new connection, and tell my network management system about it. The NMS would look at the MAC address listed in the packet, note that it doesn't recognize it, and send me an email about it, which my mail system would forward to my BlackBerry, annotated with the manufacturer name derived from the first 3 octets of the MAC.
So, here's this email saying "New unknown wifi connection from 'Nokia Danmark A/S': 00-00-00".
Gee? I wonder who (else) has an n800 in the building and knows the passcode I didn't give them?
Users tend to think about wifi access as "getting to the net". Network managers tend to think about it as "keeping unwanted people out of my fileservers".
Now, stipulated, your wifi in a corporate network shouldn't *be* inside your firewall; users should be required to VPN in to your corpnet even if it's your own wifi they're on... but most people still don't do it that way.
![]() |
2009-03-08
, 18:48
|
|
Posts: 208 |
Thanked: 36 times |
Joined on Feb 2009
@ Florida
|
#24
|
![]() |
2009-03-08
, 19:22
|
|
Posts: 900 |
Thanked: 273 times |
Joined on Aug 2008
@ Fresno CA USA
|
#25
|
![]() |
2009-03-08
, 19:36
|
|
Posts: 2,869 |
Thanked: 1,784 times |
Joined on Feb 2007
@ Po' Bo'. PA
|
#26
|
So network professionals might be able to track you down but what about those locked hotspots at coffee shops or airports? I highly doubt starbucks or mcdonalds has a network security guy in the back. Or do they train the baristas and burger flippers?! haha
![]() |
2009-03-08
, 19:37
|
|
Posts: 208 |
Thanked: 36 times |
Joined on Feb 2009
@ Florida
|
#27
|
![]() |
2009-03-11
, 12:51
|
Posts: 22 |
Thanked: 3 times |
Joined on Mar 2009
|
#28
|
![]() |
2009-03-11
, 13:13
|
|
Posts: 221 |
Thanked: 43 times |
Joined on Oct 2007
@ Sendai, Japan
|
#29
|
NEVERMIND!! GOD, simple questions get unsimple answers!!
![]() |
2009-03-11
, 15:30
|
|
Posts: 3,397 |
Thanked: 1,212 times |
Joined on Jul 2008
@ Netherlands
|
#30
|
There you go again.
"Theft" has a very specific legal meaning, and I have seen no case law that applies it even to the more clear cut case of music sharing, much less "use of a non-secured wifi connection and the Internet uplink behind it".
It IS possible to locate a rogue device on a wireless network and moreover, my wireless network has the ability to triangulate the location of ANY device within a few feet... Do it all the time.. iPhones are my worst nightmare...
In some locations we have a public wifi signal available, but that even requires a login, much like in a hotel or Boingo spot.
Anyway... Just wanted to throw this out there in case anyone thought that they could not be "found" on a wireless network...