Wi-fi bandits beware
Many people take a rather cavalier attitude towards hopping onto whatever unprotected wireless network might be at hand. You might want to rethink your perspective based on this news item blogged today by Schneier.
"Near as I can tell, there was no other criminal activity involved. The man who used someone else's wireless wasn't doing anything wrong with it; he was just using the Internet."
Of course, there are many wireless network owners that leave their networks open precisely because they do not mind at all if passers by jump on for a while. I am sure that I am not the first to suggest this, but if you have no problem with casual users on your network, broadcast a clearly inviting SSID such as "all_r_welcome".
inside the man
Subscribe to:
Post Comments (Atom)
Blog Archive
-
▼
2005
(228)
-
▼
July
(12)
- The state of go in Vermont The Birlington Free Pr...
- The Korea Times baduk lessonThe Korea Times is run...
- Hacker Gary McKinnon interviewedSlashot points out...
- What we should do A valuable thought from Schneie...
- Copyright polarization The Register has a detaile...
- Today's public service announcementThe American ro...
- One step closer to the open library system dreamI ...
- Wi-fi bandits beware Many people take a rather c...
- Anonymity of press sources - the greater good?New ...
- Lee Sedol of Korea reclaims Fujitsu CupGo / weiqi ...
- AJAX + JSON - XML = AJAJ? It might be fun, but is ...
- Google Maps iconsI just completed my first hack wi...
-
▼
July
(12)
About Me
- thrashor
- Edmonton, Alberta, Canada
- Returned to working as a Management Consultant, specializing in risk, security, and regulatory compliance, with Fujitsu Canada after running the IT shop in the largest library in the South Pacific.
No comments:
Post a Comment