OT: unathorized network user.

Jimmy Bradley bmobile40 at bellsouth.net
Wed Jan 23 10:21:32 UTC 2008


        I got the problem solved. It was a more expensive way to go, but
it works out better in the end. The phone jack where my dsl modem and
routers connect is upstairs in the bedroom. It was a lot of trouble, but
I paid the apartment manager a fee to have ethernet wall jacks installed
both upstairs and downstairs. The one computer I have downstairs, sits
right underneath the main one upstairs, so the guy was able to run the
cables straight down inside the wall.
        He installed a 4 port ethernet wall jack both upstairs and down
stairs. My wireless router is connected to the wired router to act as a
switch. Once he was done running the cable and all, I accessed the
wireless router, and turned off the wireless feature, ran eithernet
cables from the 3 remaining ports on it to the wall jacks, then
connected the machine downstairs, and I was all set. Yeah, it was a lot
of trouble, and a more expensive way to go, but ethernet is more
reliable,plus the speed is faster too.
        Yeah, everyone did say pretty much the same thing, but at the
same time everybody seemed to miss the fact that I mentioned that I
didn't run the network open all the time, and no it wasn't really right
to transfer files to their hard drive, but none of the files were
malicious in any way. Most of the were cd image files for different
linux distros, and video files from cbs news, and best of all, mp3 files
of Bill Oreilly's weekly radio show. Now, I've built I don't know how
many pc's, and I've filled up many a hard drive on them. I just don't
see how you can damage some one's machine by saving files to their hard
drive, unless the files are infected with viruses or some other
malicious code, and that was just not the case here. All some one would
have to do to undo what I've done is to simply delete the files. 
Plus, being how the file transfer took place through my router, and not
my isp, and the fact that they have their hard drive wide open to
anyone, I don't see how it would be traceable.
   Anyway, the problem is solved, I don't see any need for debating it
any further. I don't want this to end up being a thread that runs for
ever like some of them have lately.

Jim

On Tue, 2008-01-22 at 12:27 +0000, Da Rock wrote:
> System administration is not as cut and dried as you make it out to be. So far everyone here has said the same thing- Secure your network. Rule number one in the real world: Protect your six at all times. And from a legal standpoint 2 wrongs don't make a right. So you don't have a leg to stand on no matter where you live in this world.
> 
> Sorry, but you're going to have to do your job properly and research what is going on with your encryption problems.
> 
> You see here that you can get an answer to your questions- even if they're not the ones you want to hear. So why not get some help with your network?
> 
> 
> ----------------------------------------
> > Date: Tue, 22 Jan 2008 18:52:51 +0800
> > From: Ed.Greshko at greshko.com
> > To: fedora-list at redhat.com
> > Subject: Re: OT: unathorized network user.
> > 
> > Jimmy Bradley wrote:
> >>         I don't know why the Linux machines can't see windows machine
> >> when the signal is encrypted. I've spent a whole weekend before trying
> >> to figure it out, but with no luck.
> >>         Now, as far as running the network open,in a number of states,
> >> including Alabama, it is against the law to access an open network
> >> without authorization from the network owner, and you can in fact go to
> >> jail for it. Just because the radio waves from the network enter your
> >> living space, doesn't give you the right to utilize then without proper
> >> authorization. It's the same thing as the signals from say Sirius or
> >> Direct TV. The signals pass through your home, but it is illegal to use
> >> the signal without authorization from the signal owners.
> > 
> > If it is illegal to use someone's network without their permission I suspect 
> > it is equally illegal to access someone's computer without their permission 
> > even if they are on your network.
> > 
> > So, secure your network....
> > 
> >> 
> >> 
> >> Jim
> >> 
> >> On Tue, 2008-01-22 at 10:31 +0000, Da Rock wrote:
> >>> I'd figure out some way to fix your network so you can encrypt it again. First rule of sysadmin is to protect your network- if you can't do that then you can't really blame others for accessing it. Besides the simple aspect that if someone this clueless can access your network then what could someone malicious do?
> >>>
> >>>
> >>> ----------------------------------------
> >>>> From: bmobile40 at bellsouth.net
> >>>> To: fedora-list at redhat.com
> >>>> Date: Tue, 22 Jan 2008 04:16:04 -0600
> >>>> Subject: OT: unathorized network user.
> >>>>
> >>>>        I live in an apartment complex, and I have a wireless network
> >>>> that most of the time, I run encrypted. For some reason, in order for my
> >>>> Linux machines to see my one remaining windows machine, I have to turn
> >>>> off the encryption. Not long after I turn the encryption off, there is
> >>>> some one who lives near me, whose machine gets on my network.
> >>>>         Now,get this, apparently the machine is setup to share the whole
> >>>> hard drive,because I can see all the folders on the hard drive. By the
> >>>> way, it's an 80gig hard drive. I have written and saved text files to
> >>>> the machine's desktop, asking the person to stay off my network, but
> >>>> they continue to get on my network. The last text message I saved to the
> >>>> person's desktop was a message saying that they have ignored all my
> >>>> warnings, so they leave me no choice but to fill up their hard drive.
> >>>> So far, I have filled their hard drive about halfway up, and they still
> >>>> get on my network. I haven't saved any malicious files to their machine.
> >>>> It's mostly been Linux distro iso's and video(no porn)and audio files
> >>>> that I know they won't like. Just nice big files.
> >>>>         This person has to be clueless as to what is going on. You'd
> >>>> think they would've noticed something by now.
> >>>>         My question is, does anyone have any other ideas as to handle
> >>>> this problem? I mean, I don't want to fill this person's hard drive up,
> >>>> but if I have to, I will.
> >>>>
> >>>> Thanks
> >>>>
> >>>> Jim
> >>>>
> >>>> -- 
> >>>> fedora-list mailing list
> >>>> fedora-list at redhat.com
> >>>> To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
> >>> _________________________________________________________________
> >>> It's simple! Sell your car for just $30 at CarPoint.com.au
> >>> http://a.ninemsn.com.au/b.aspx?URL=http%3A%2F%2Fsecure%2Dau%2Eimrworldwide%2Ecom%2Fcgi%2Dbin%2Fa%2Fci%5F450304%2Fet%5F2%2Fcg%5F801459%2Fpi%5F1004813%2Fai%5F859641&_t=762955845&_r=tig_OCT07&_m=EXT
> >>>
> >> 
> > 
> > 
> > -- 
> > Yow!  I forgot my PAIL!!
> > 
> > -- 
> > fedora-list mailing list
> > fedora-list at redhat.com
> > To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
> 
> _________________________________________________________________
> Overpaid or Underpaid? Check our comprehensive Salary Centre
> http://a.ninemsn.com.au/b.aspx?URL=http%3A%2F%2Fcontent%2Emycareer%2Ecom%2Eau%2Fsalary%2Dcentre%3Fs%5Fcid%3D595810&_t=766724125&_r=Hotmail_Email_Tagline_MyCareer_Oct07&_m=EXT
> 




More information about the users mailing list