OT: unathorized network user.

Robert L Cochran cochranb at speakeasy.net
Wed Jan 23 11:07:16 UTC 2008

Hash: SHA1

Jimmy Bradley wrote:
>         I got the problem solved. It was a more expensive way to go, but
> it works out better in the end. The phone jack where my dsl modem and
> routers connect is upstairs in the bedroom. It was a lot of trouble, but
> I paid the apartment manager a fee to have ethernet wall jacks installed
> both upstairs and downstairs. The one computer I have downstairs, sits
> right underneath the main one upstairs, so the guy was able to run the
> cables straight down inside the wall.
>         He installed a 4 port ethernet wall jack both upstairs and down
> stairs. My wireless router is connected to the wired router to act as a
> switch. Once he was done running the cable and all, I accessed the
> wireless router, and turned off the wireless feature, ran eithernet
> cables from the 3 remaining ports on it to the wall jacks, then
> connected the machine downstairs, and I was all set. Yeah, it was a lot
> of trouble, and a more expensive way to go, but ethernet is more
> reliable,plus the speed is faster too.
>         Yeah, everyone did say pretty much the same thing, but at the
> same time everybody seemed to miss the fact that I mentioned that I
> didn't run the network open all the time, and no it wasn't really right
> to transfer files to their hard drive, but none of the files were
> malicious in any way. Most of the were cd image files for different
> linux distros, and video files from cbs news, and best of all, mp3 files
> of Bill Oreilly's weekly radio show. Now, I've built I don't know how
> many pc's, and I've filled up many a hard drive on them. I just don't
> see how you can damage some one's machine by saving files to their hard
> drive, unless the files are infected with viruses or some other
> malicious code, and that was just not the case here. All some one would
> have to do to undo what I've done is to simply delete the files. 
> Plus, being how the file transfer took place through my router, and not
> my isp, and the fact that they have their hard drive wide open to
> anyone, I don't see how it would be traceable.
>    Anyway, the problem is solved, I don't see any need for debating it
> any further. I don't want this to end up being a thread that runs for
> ever like some of them have lately.
> Jim

Your damaging of another person's property certainly was malicious. The
content of the files you put on the other person's system is irrelevant.
Your action is what counts. You wanted to fill up that computer's hard
drive till something broke. That could be seen as a denial of service

Bob Cochran

Version: GnuPG v1.4.7 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org


More information about the users mailing list