the only way to geographically fix a wireless connection is via triangulation |
|
Okay, I'm fairly adept with computers but I know next to nothing about networking. My question is, if I am picking up internet from a wireless router in a neighbor's house; how difficult is it to trace my activity directly to my computer? Is the trail going to end at their house, or is their some way to find where I'm connecting from, and if there is; is it something that will still be findable after I disconnect from their network? |
|
Art
The ability to happily respond to any adversity is the divine.
Dream Journal Shaman Apprentice Chronicles
the only way to geographically fix a wireless connection is via triangulation |
|
Last edited by Ynot; 04-15-2008 at 05:11 PM.
(\_ _/)
(='.'=)
(")_(")
Not sure for certain, but I'd guess they'd be able to trace it to the router, but they won't be able to trace it to your computer unless you're connected to the network. |
|
[broken link removed]The Dynamics of Segrival[/URL]
Discuss Segrival here
See my other [broken link removed]
(\_ _/)
(='.'=)
(")_(")
Well I won't be shy and admit I have done some of my leeching from neighbors wifi, I even brought an SRX 400 attenna for the bigger pc |
|
Can you say "Network Sniffer?" |
|
Okay, I've got another question. Is it possible for me as a normal user to find the IP address of someone else who is using a forum? |
|
Art
The ability to happily respond to any adversity is the divine.
Dream Journal Shaman Apprentice Chronicles
I know I've mentioned this before, somewhere |
|
If they are a computer a geek then this is true. Considering he is tapping into a neighbor's wifi and then saying he doesn't know networking (which means cracking WEP or WPA is out of the question), I think it's safe to assume that the neighbor is not using encryption, and therefore is a computer noob. And computer noobs are not going to be monitoring or logging their traffic. I think he's safe. |
|
Your neighbour can also check the DHCP table and can usually see the names of the machines connected. Like, if you are called Joe, and your computer is called Joe204, your neighbour can probably figure out who you are. |
|
---------
Lost count of how many lucid dreams I've had
---------
I can't believe there are people setting up wireless networks all over the place who don't bother to encrypt it. |
|
_________________________________________
We now return you to our regularly scheduled signature, already in progress.
_________________________________________
My Music
The Ear Is Always Correct - thoughts on music composition
What Sky Saw - a lucid dreaming journal
Unencrypted connections are just convenient |
|
Last edited by Ynot; 07-16-2008 at 06:10 PM.
I'm talking more about people's home networks, which is what I'm picking up in my little patch of suburbia. |
|
_________________________________________
We now return you to our regularly scheduled signature, already in progress.
_________________________________________
My Music
The Ear Is Always Correct - thoughts on music composition
What Sky Saw - a lucid dreaming journal
same difference, really |
|
I'm very stingy with my bandwidth. I paid for it, and I want every speck of it to myself! |
|
_________________________________________
We now return you to our regularly scheduled signature, already in progress.
_________________________________________
My Music
The Ear Is Always Correct - thoughts on music composition
What Sky Saw - a lucid dreaming journal
maybe I'm too nice.... |
|
This sounds like much more trouble then just putting a simple MAC filter and WEP key on your network. Sure it's still easily hackable, but only to other computer geeks. WPA is really what everyone should be doing, but it's a pain in the ass to get connected in linux to WPA. |
|
Bookmarks