Free Republic
Browse · Search
General/Chat
Topics · Post Article


1 posted on 07/25/2011 5:58:56 PM PDT by decimon
[ Post Reply | Private Reply | View Replies ]


Navigation: use the links below to view more comments.
first 1-2021-24 next last
To: ShadowAce

Help wanted ping.


2 posted on 07/25/2011 6:00:07 PM PDT by decimon
[ Post Reply | Private Reply | To 1 | View Replies ]

To: decimon

Depends on the network and the laptop. Anything going over the network is easily intercepted unless its encrypted. If your laptop isn’t configured properly they can gain access to your disk drive.

Say you log into email and read them. They’ve captured your login/password and the contents of the email.

All wireless networks can be hacked using free software.


3 posted on 07/25/2011 6:02:29 PM PDT by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: decimon
I'm not asking about porn

Oh, please. You certainly are. Don't be perpetratin'.

4 posted on 07/25/2011 6:02:40 PM PDT by humblegunner
[ Post Reply | Private Reply | To 1 | View Replies ]

To: decimon

Depends on the network and the laptop. Anything going over the network is easily intercepted unless its encrypted. If your laptop isn’t configured properly they can gain access to your disk drive.

Say you log into email and read them. They’ve captured your login/password and the contents of the email.

All wireless networks can be hacked using free software.


5 posted on 07/25/2011 6:02:40 PM PDT by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: decimon
 
 
At bare minimum, your full computer name and unique network adaptor ID are logged.
 
 

6 posted on 07/25/2011 6:03:34 PM PDT by lapsus calami (What's that stink? Code Pink ! ! And their buddy Murtha, too!)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: decimon

Some of the wireless tools.

http://sectools.org/wireless.html


7 posted on 07/25/2011 6:04:46 PM PDT by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Noumenon

Ping.


8 posted on 07/25/2011 6:05:10 PM PDT by DuncanWaring (The Lord uses the good ones; the bad ones use the Lord.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: decimon

It all depends on your setup, and theirs.

If you want complete anonymity, a fresh iPod Touch, laptop or unregistered Droid wouldn’t have anything to share that was too useful. (MAC ID, browser info, etc.)

Many of these hotspots have a long disclaimer that requires you to click on something. That something may or may not be poking around. Frankly, the folks at the local Burger King or Howard Johnson’s don’t have anything terribly sophisticated.

You could set up a virtualized OS on a laptop, log in with that, and wipe it regularly... that would be quite safe.


9 posted on 07/25/2011 6:05:19 PM PDT by Dr. Sivana (There is no salvation in politics.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: decimon

Download a linux distro called Tails , install it onto a thumb drive, make sure to decide if you want a persistent storage partition on the thumb drive or not from the start.

http://tails.boum.org/

General problems of getting Linux drivers for your laptop apply.


10 posted on 07/25/2011 6:06:44 PM PDT by JerseyHighlander
[ Post Reply | Private Reply | To 1 | View Replies ]

To: decimon

Plus the fact that at a public WiFi location you are in public. Besides eyewitnesses there are all those security cameras.


11 posted on 07/25/2011 6:07:53 PM PDT by cicero2k
[ Post Reply | Private Reply | To 1 | View Replies ]

To: decimon
When you log on to a Wi-Fi network with a laptop computer, how much info about yourself do you reveal?

How much info I reveal about myself depends on how good looking the girl sitting next to me is.

12 posted on 07/25/2011 6:08:17 PM PDT by mlocher (Is it time to cash in before I am taxed out?)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: decimon
We aren't watching you -- much

You do know that all monitors made after 2003 were bidirectional, right? It is our little joke that we make a small camera-looking thing in some models to make humans think that is how we watch them...

13 posted on 07/25/2011 6:10:23 PM PDT by freedumb2003 (Herman Cain 2012)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: decimon

At an open, unsecured WIFI spot, everything you send can be sniffed - basically all your email, browsing, etc.

Best to connect to a VPN first, then do all your other transactions - that way everything is encrypted before it goes over the WIFI network.


15 posted on 07/25/2011 6:12:23 PM PDT by FromTheSidelines ("everything that deceives, also enchants" - Plato)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: decimon

This is why large companies insist their employees use VPN at these wireless places. Whether you would want to set up a home VPN depends on your skill level.


16 posted on 07/25/2011 6:13:26 PM PDT by proxy_user
[ Post Reply | Private Reply | To 1 | View Replies ]

To: decimon

Well gee for starters, your MAC address, the make and model of the accessing device, all stored log on info, all browser access while your logged on to that wireless network. If we flip a couple of software switches we can monitor all the traffic on your assigned IP address...some encrypted some not. It’s like trusting Google... be afraid... be very afraid


17 posted on 07/25/2011 6:15:59 PM PDT by hatfieldmccoy (The Obama beat down of America continues)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: decimon

Don’t buy any thing online at a hotspot, just read Free Republic.


19 posted on 07/25/2011 6:17:11 PM PDT by InvisibleChurch (In loving memory of Abraham Lincoln, 1809 - 1865)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: decimon

Your Mac address would be exposed to anyone that wants to log it, which cross references you to home.


20 posted on 07/25/2011 6:18:10 PM PDT by omega4179
[ Post Reply | Private Reply | To 1 | View Replies ]

To: decimon

Depends on what you mean by “cracker/hacker” and how you interpret the law. By strict interpretation of the law they can only legally know anything about you if you give them permission.

For example my Fortune 500 company cannot “catch” illegal penetration to our system by setting up an anonymous hotspot and monitoring users as they access it. It is illegal for us to monitor or record anything they do (at least our lawyers say that and I’ve talked to IT people at other companies who say the same). On the other hand there are laws saying we must record a lot of things.

A lot of the laws haven’t been tested, and a small hotspot admin won’t know or care. They will be able to watch anything you do. If you are secure (e.g. https or sftp) they can see what domains you look up but nothing else (e.g. they may know you tried to find www.IWantPorn.com and how many pages or files you requested/sent there but they won’t know more). If you are not secure they can see the full url or filename you request and any values you enter on forms. All of this, while technically illegal, would probably not get them in a lot of trouble. And they would be required to record it in some cases if they advertise their hotspot service.

Depending on your configuration they will be able to access your computer in ways that many people would not consider cracking/hacking. This would be considered illegal in most cases and you’d at least have a civil suit if they caused you problems.

With some easy-to-get cracker/hacker tools, a bored admin can access a lot of your system. The simple answer is that if you trust the operator, assume you are safe. And if you don’t trust them assume you are wide open.


28 posted on 07/25/2011 6:31:13 PM PDT by LostPassword
[ Post Reply | Private Reply | To 1 | View Replies ]

To: decimon

Since spending a weekend at the Las Vegas Trump Hotel with “free” wi-fi , my lap top is inundated with Trump ads


30 posted on 07/25/2011 6:34:26 PM PDT by hecht (TAKE BACK OUR NATION AND OUR NATIONAL ANTHEM)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: decimon
You can try a tool like Tor. It will take a little reading and digesting.
39 posted on 07/25/2011 7:07:35 PM PDT by andyk (Interstate != Intrastate)
[ Post Reply | Private Reply | To 1 | View Replies ]


Navigation: use the links below to view more comments.
first 1-2021-24 next last

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson