D
Dave Platt
Guest
In article <kcui3h$epf$1@dont-email.me>,
William Sommerwerck <grizzledgeezer@comcast.net> wrote:
encryption can be broken quite easily. WPA2 using AES is still
robust, as long as you choose your passphrase well (randomly-generated
strings are good, simple phrases and names are bad). MAC filtering
helps a bit, but if the attacker is willing to hang around until s/he
sees a bit of legitimate traffic passed through your net s/he can
collect MAC addresses which go right past your filters.
GMail, etc.) with login credentials, or have any sort of always-on
internet access, or keep any sort of financial records on your PC,
you're a target of interest to *someone*.
The botnets which are used to distribute massive amounts of spam,
serve out malicious software, and act as "distributed denial of
service" attack nodes are *precisely* the sorts of computers that
"most users" own. Selling unauthorized access to compromised
computers of this sort, in bulk, is a pretty big bu$ine$$ for some
very active gangs of cybercriminals.
As to having people access your wireless network connection without
your knowledge... some people have had *very* painful and expensive
experiences with this, when it turned out that a "drive-by downloader"
used their open net to download "ripped" movies or songs, child porn,
etc. and the downloads were tracked back to the household in question
by law enforcement and/or the ISP. Proving that you (the householder)
didn't use the net for illegal activity could be difficult, and in a
civil suit (by a big media company for example) "innocent until proven
guilty" doesn't protect you from the costs of defending the suit.
I hate to say it... I hate the situation... but it's a very hostile
Internet out there. Believing that the average user is safe from
attack because "they wouldn't be interested" is a potentially *very*
expensive form of ignorance.
--
Dave Platt <dplatt@radagast.org> AE6EO
Friends of Jade Warrior home page: http://www.radagast.org/jade-warrior
I do _not_ wish to receive unsolicited commercial email, and I will
boycott any company which has the gall to send me such ads!
William Sommerwerck <grizzledgeezer@comcast.net> wrote:
To be reasonably secure these days you need strong encryption. WEPThat's assuming there's no data encryption. I use both encryption and MAC
filtering.
encryption can be broken quite easily. WPA2 using AES is still
robust, as long as you choose your passphrase well (randomly-generated
strings are good, simple phrases and names are bad). MAC filtering
helps a bit, but if the attacker is willing to hang around until s/he
sees a bit of legitimate traffic passed through your net s/he can
collect MAC addresses which go right past your filters.
Both are almost trivially easy, without any specialized hardware at all.Nevertheless, I appreciate this information, as the book I read indicated that
you needed hardware to spoof a MAC address. (Perhaps the author was talking
about what was required to sniff it.)
Ummm... if you use any sort of on-line service (banking, iTunes,A friend of mine remarked that both he and I were relatively safe from such
attacks. "Why would anyone be interested in accessing //our// computers?"
Indeed. This is true for most users. Of course, it's no excuse for not taking
simple steps to protect yourself.
GMail, etc.) with login credentials, or have any sort of always-on
internet access, or keep any sort of financial records on your PC,
you're a target of interest to *someone*.
The botnets which are used to distribute massive amounts of spam,
serve out malicious software, and act as "distributed denial of
service" attack nodes are *precisely* the sorts of computers that
"most users" own. Selling unauthorized access to compromised
computers of this sort, in bulk, is a pretty big bu$ine$$ for some
very active gangs of cybercriminals.
As to having people access your wireless network connection without
your knowledge... some people have had *very* painful and expensive
experiences with this, when it turned out that a "drive-by downloader"
used their open net to download "ripped" movies or songs, child porn,
etc. and the downloads were tracked back to the household in question
by law enforcement and/or the ISP. Proving that you (the householder)
didn't use the net for illegal activity could be difficult, and in a
civil suit (by a big media company for example) "innocent until proven
guilty" doesn't protect you from the costs of defending the suit.
I hate to say it... I hate the situation... but it's a very hostile
Internet out there. Believing that the average user is safe from
attack because "they wouldn't be interested" is a potentially *very*
expensive form of ignorance.
--
Dave Platt <dplatt@radagast.org> AE6EO
Friends of Jade Warrior home page: http://www.radagast.org/jade-warrior
I do _not_ wish to receive unsolicited commercial email, and I will
boycott any company which has the gall to send me such ads!