Every cable modem I've ever used is assigned a dynamic public IP each time it's powered on. But then again, as far as Cable goes, I've only worked with Comcast in my region so that may vary. The setup you describe would make sense for the story in the video.
Ah, I thought I heard him say he kept trying to ping the IP, this makes plenty of sense though. What a lifesaver it was for him to leave DynDNS running all the time!![]()
The cable modem isn't assigning the IP address. The ISP is. If an IP address is public, then it isn't being assigned by a local modem.
That's why I worded it "the modem is assigned", not "the modem assigns"![]()
It was such a long time (two years) between when the computer was stolen and when he gained access to it, you gotta wonder if that's even the guy who stole it.
When I hear Mac I automatically assume it's a laptop. Pardon me all to hell.
The dude even showed a picture of the G4 tower if you didn't know what a G4 looked like.When I hear Mac I automatically assume it's a laptop. Pardon me all to hell.
Agreed. To call this guy a hacker is stupid.NOT a hacker. This guy is some random dude with several ways to access his machine. Quit calling random people that use random software "Hackers". (though, the story was entertaining.)
The only part he would have goofed up is where he would let the thief know he has access to the computer. If he wanted to get his stuff back, he would have never let the thief in on the fact that he knew where he was.
The dude even showed a picture of the G4 tower if you didn't know what a G4 looked like.
He had a picture of the DESKTOP, and he repeatedly said DESKTOP. You didn't watch it.
I don't see how he justifies including the pictures of the girls though.
Could have been on dial-up for a while then later got cable or DSL. I still have a dial-up account for use when the cable is out. I used it about six months ago (painful as it was) when the cable was out all freaking day.
I don't know if the "hacker" confirmed whether the IP address was statically set on the NIC or not, but let's assume it was. If the "owner" didn't have rights to change the IP settings, then the PC would have to sit behind a router. It'd be a lot harder to gain access to the services running on the Mac behind a router. But the dude did say he was using rsync to send (keylogger) data to him so maybe he didn't need to have access to it all the time.Could have been on dial-up for a while then later got cable or DSL. I still have a dial-up account for use when the cable is out. I used it about six months ago (painful as it was) when the cable was out all freaking day.
when did linux users become superior to unix users?
Macs use Unix as an OS IIRC.
EDIT: NM, I see this has already been addressed.
This.
![]()
They obviously missed my comment regarding that subject, read up. If you're too lazy to read up, I said 'Ever since the "unix" came with a pretty interface and dumb down so stupid yuppies can click their ways around'.Ok, seriously people. Just because you own a Mac doesn't mean you know unix or linux.![]()
They obviously missed my comment regarding that subject, read up. If you're too lazy to read up, I said 'Ever since the "unix" came with a pretty interface and dumb down so stupid yuppies can click their ways around'.
Anyways, reading the rest of this thread leads me to believe there are as many dumb asses in this thread about networking, and computing in general as the guy that allegedly stole the Mac.
I agree that what he did wasn't exactly rocket science though. The fact that it took him two years to actually find the machine implies that he wasn't that concerned with finding it also.
Wow, tough crowd.
Bottom line is, from the video and incident alone we can't say this guy isn't a "hacker". This case demonstrates that he at least has an above average knowledge of computers, namely his own.
I agree that what he did wasn't exactly rocket science though. The fact that it took him two years to actually find the machine implies that he wasn't that concerned with finding it also.
Finally, why is everyone up in arms about hackers using MacOS?
I assume what happened is that he only had the NIC settings locked down, but dial-up was editable or at least dynamic settings were enabled/allowed. So the user is on dial-up and the owner is able to ssh into the machine. Maybe he then unlocked the NIC settings (since he has the admin password) just in case the machine gets plugged into a network or router. Or hey, perhaps he had a WLAN adapter in there, or he noticed the guy tried to plug a WLAN adapter but it wasn't installed because it required admin privileges. So was able to connect to an unsecured wireless network. Or he did everything over dial-up over many many sessions.I don't know if the "hacker" confirmed whether the IP address was statically set on the NIC or not, but let's assume it was. If the "owner" didn't have rights to change the IP settings, then the PC would have to sit behind a router.
A hacker that uses a mac? LLLLLLLLLLLLLLLUUUUUUUUUUUUUUUUULLLLLZZZZZZZZZZZZZZZZZZZZZ
Sorry, had to do it.
P.S. I'm a Linux user, nice and smug.