Who is doing the hacking?

audsnends

Member
Dec 20, 2005
25
0
0
Is there a way to find out who and the location of the person hacking ones wireless connection?
 

CKent

Diamond Member
Aug 17, 2005
9,020
0
0
Sorry man, couldn't help myself. Jesus that's a big bestiality collection :shocked:
 

her209

No Lifer
Oct 11, 2000
56,336
11
0
Originally posted by: joshsquall
Why not just secure it? Setup WEP, then setup a list to only allow your MAC addresses.
Even that is not secure. Use WPA.
 

Pepsei

Lifer
Dec 14, 2001
12,895
1
0
er, i'm sorry, i'll connect to someone else.

and that's not really "hacking".
 

LikeLinus

Lifer
Jul 25, 2001
11,518
670
126
Originally posted by: BrokenVisage
Originally posted by: her209
Originally posted by: joshsquall
Why not just secure it? Setup WEP, then setup a list to only allow your MAC addresses.
Even that is not secure. Use WPA.

Even WPA is not secure, use WPA2 Enterprise.

Even that isn't secure. Use a wired LAN with no outside internet connection FTW!!!!

WPA is secure enough for anyone around your hood :)
 

Gunslinger08

Lifer
Nov 18, 2001
13,234
2
81
Originally posted by: LikeLinus
Originally posted by: BrokenVisage
Originally posted by: her209
Originally posted by: joshsquall
Why not just secure it? Setup WEP, then setup a list to only allow your MAC addresses.
Even that is not secure. Use WPA.

Even WPA is not secure, use WPA2 Enterprise.

Even that isn't secure. Use a wired LAN with no outside internet connection FTW!!!!

WPA is secure enough for anyone around your hood :)

Even that isn't secure. Use a notebook and pencil to record your innermost thoughts and seal yourself in a ventilated safe with 10 years of food and 50' thick walls.

Door locks only keep out the honest people. Similarly, anyone who really wants to get in to your wireless network will. All you're doing is making it more difficult. It gets to a point where the effort you put in to make it more "secure" is not worth the number of people that you're blocking. Chances are, no one living around you even knows how to find your MAC address and clone it. Much less break WEP, WAP, WAP2, etc.
 

LikeLinus

Lifer
Jul 25, 2001
11,518
670
126
Originally posted by: joshsquall
Originally posted by: LikeLinus
Originally posted by: BrokenVisage
Originally posted by: her209
Originally posted by: joshsquall
Why not just secure it? Setup WEP, then setup a list to only allow your MAC addresses.
Even that is not secure. Use WPA.

Even WPA is not secure, use WPA2 Enterprise.

Even that isn't secure. Use a wired LAN with no outside internet connection FTW!!!!

WPA is secure enough for anyone around your hood :)

Even that isn't secure. Use a notebook and pencil to record your innermost thoughts and seal yourself in a ventilated safe with 10 years of food and 50' thick walls.

So THAT'S where Hoffa went!
 

her209

No Lifer
Oct 11, 2000
56,336
11
0
Originally posted by: joshsquall
Even that isn't secure. Use a notebook and pencil to record your innermost thoughts and seal yourself in a ventilated safe with 10 years of food and 50' thick walls.
Won't do anything when someone decides to pump in some cyanide. :evil:
 

KeyserSoze

Diamond Member
Oct 11, 2000
6,048
1
81
Originally posted by: joshsquall
Originally posted by: LikeLinus
Originally posted by: BrokenVisage
Originally posted by: her209
Originally posted by: joshsquall
Why not just secure it? Setup WEP, then setup a list to only allow your MAC addresses.
Even that is not secure. Use WPA.

Even WPA is not secure, use WPA2 Enterprise.

Even that isn't secure. Use a wired LAN with no outside internet connection FTW!!!!

WPA is secure enough for anyone around your hood :)

Even that isn't secure. Use a notebook and pencil to record your innermost thoughts and seal yourself in a ventilated safe with 10 years of food and 50' thick walls.

Door locks only keep out the honest people. Similarly, anyone who really wants to get in to your wireless network will. All you're doing is making it more difficult. It gets to a point where the effort you put in to make it more "secure" is not worth the number of people that you're blocking. Chances are, no one living around you even knows how to find your MAC address and clone it. Much less break WEP, WAP, WAP2, etc.


Even THAT's not secure enough. End yourself, and no one can ever know anything about you or what you do.


Use the highest encryption settings that your router/hardware support, and forget about it.




KS
 

phisrow

Golden Member
Sep 6, 2004
1,399
0
0
If you have the right equipment, you can triangulate and track their emitter. For what the right equiptment costs, though, you could probably just get a couple of thugs to beat up everyone with a computer in range of your access point.
 

Eeezee

Diamond Member
Jul 23, 2005
9,922
0
76
Get a gun and walk around your neighborhood looking for the culprit. If you see anyone with a PC or laptop that can connect wirelessly, end them with the gun and steal their computer. Power it down and check to see if your wireless connection is still getting hax0red. If so, repeat until you are the only user remaining on your secured wireless network.
 

JonnyStarks

Golden Member
Nov 28, 2003
1,682
0
0
Originally posted by: Eeezee
Get a gun and walk around your neighborhood looking for the culprit. If you see anyone with a PC or laptop that can connect wirelessly, end them with the gun and steal their computer. Power it down and check to see if your wireless connection is still getting hax0red. If so, repeat until you are the only user remaining on your secured wireless network.

I went this way a couple months ago when I saw some people stealing my bandwidth. Solved the problem right away.
 

Buck Naked

Senior member
Jun 29, 2005
706
0
0
Originally posted by: Eeezee
Get a gun and walk around your neighborhood looking for the culprit. If you see anyone with a PC or laptop that can connect wirelessly, end them with the gun and steal their computer. Power it down and check to see if your wireless connection is still getting hax0red. If so, repeat until you are the only user remaining on your secured wireless network.

That is not legal or ethical. There is no need to steal the computer, just power it off. :disgust::)
 

shilala

Lifer
Oct 5, 2004
11,437
1
76
Originally posted by: joshsquall
Originally posted by: LikeLinus
Originally posted by: BrokenVisage
Originally posted by: her209
Originally posted by: joshsquall
Why not just secure it? Setup WEP, then setup a list to only allow your MAC addresses.
Even that is not secure. Use WPA.

Even WPA is not secure, use WPA2 Enterprise.

Even that isn't secure. Use a wired LAN with no outside internet connection FTW!!!!

WPA is secure enough for anyone around your hood :)
Use a notebook and pencil to record your innermost thoughts and seal yourself in a ventilated safe with 10 years of food and 50' thick walls.
FTFW.

 

DaiShan

Diamond Member
Jul 5, 2001
9,617
1
0
Originally posted by: LikeLinus
Originally posted by: BrokenVisage
Originally posted by: her209
Originally posted by: joshsquall
Why not just secure it? Setup WEP, then setup a list to only allow your MAC addresses.
Even that is not secure. Use WPA.

Even WPA is not secure, use WPA2 Enterprise.

Even that isn't secure. Use a wired LAN with no outside internet connection FTW!!!!

WPA is secure enough for anyone around your hood :)


Even that is not secure, encrypt all traffic with a VPN! :p
 

jiwq

Platinum Member
May 24, 2001
2,036
0
0
Originally posted by: shilala
Originally posted by: joshsquall
Originally posted by: LikeLinus
Originally posted by: BrokenVisage
Originally posted by: her209
Originally posted by: joshsquall
Why not just secure it? Setup WEP, then setup a list to only allow your MAC addresses.
Even that is not secure. Use WPA.

Even WPA is not secure, use WPA2 Enterprise.

Even that isn't secure. Use a wired LAN with no outside internet connection FTW!!!!

WPA is secure enough for anyone around your hood :)
Use a notebook and pencil to record your innermost thoughts and seal yourself in a ventilated safe with 10 years of food and 50' thick walls.
FTFW.

while you're asleep, tom cruise will wire his way down and hack your notebook