Security Basics mailing list archives
RE: RE: Wireless Security
From: "Herman Frederick Ebeling, Jr." <hfebelingjr () lycos com>
Date: Wed, 19 Oct 2005 12:22:12 -0400
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ----Original Message---- From: G. Allen Johnson [mailto:gallenjohnson () sbcglobal net] Sent: Tuesday, 18 October, 2005 22:58 To: hfebelingjr () lycos com Subject: RE: RE: Wireless Security ::: Then couldn't a ::: person (or their lawyer) who has had their ::: wireless network (or even a wired network) hacked make the same claim about ::: the information that their computer is ::: providing to Windows explorer? : : As another fellow on this same subject told you, passive activity should be : very defensible, such as reading that return address, but active scanning : will get you into trouble. And wouldn't that be a passive activity? : ::: Using your own analogy admin/security tools are just admin/security tools ::: until someone uses them to gain unauthorized ::: access to a computer that they wouldn't normally have access to. . . ::: Correct? : : Correct. Just about every hacker tool out there either has a "pen-test" : equivalent, or was designed as such to begin with. Now bear in mind : however, that while possession of the tool alone wouldn't be grounds for : arrest, it could give an investigating officer probably cause, and that : comes w/ its own sets of problems and permutations. : : G. Allen Johnson. : : -----Original Message----- : From: Herman Frederick Ebeling, Jr. [mailto:hfebelingjr () lycos com] : Sent: Monday, October 17, 2005 8:00 PM : To: another () roundcube net; Security-Basics : Subject: RE: RE: Wireless Security : : : *** PGP SIGNATURE VERIFICATION *** : *** Status: Bad Signature : *** Alert: Signature did not verify. Message has been altered. : *** Signer: Herman Frederick Ebeling Jr. <hfebelingjr () lycos com> (0xDB13DBD3) : *** Signed: 17-Oct-05 10:43:37 PM : *** Verified: 18-Oct-05 11:47:35 PM : *** BEGIN PGP VERIFIED MESSAGE *** : : ----Original Message---- : From: Another User [mailto:another () roundcube net] : Sent: Monday, 17 October, 2005 19:14 : To: hfebelingjr () lycos com : Subject: Re: RE: Wireless Security : :: this is cool. I think I like this. :: :: On Fri, 14 Oct 2005 23:01:36 -0400, "Herman Frederick Ebeling, Jr." :: <hfebelingjr () lycos com> wrote: ::: ::: -----BEGIN PGP SIGNED MESSAGE----- ::: Hash: SHA1 ::: ::: G. Allen, ::: ::: Using your analogy of someone putting their outgoing snail mail into "your" ::: mailbox and how their return address is ::: personal information that they've released into the public. Then couldn't a ::: person (or their lawyer) who has had their ::: wireless network (or even a wired network) hacked make the same claim about ::: the information that their computer is ::: providing to Windows explorer? ::: ::: I mean we all know that there is a certain amount of information that can be ::: gleaned from a computer hooked to the ::: network without actually opening said computer. ::: ::: And as I am sure as we all know now all "hackers" are bad. As we would not ::: have a lot of the admin/security tools ::: that we now enjoy IF it weren't for "hackers." Nor would people know about ::: the security problems that are present in ::: some systems/software. But sadly the media (at present) "likes" to call ::: anyone and everyone who commits a crime with a ::: computer a "hacker" whether they are or not. All that matters to the media ::: is that a crime was committed and that a ::: computer was used to commit that crime, so ergo the person who committed said ::: crime "MUST" be a "hacker. . ." ::: ::: I mean using the way the media uses the term hacker the dumpster diver who ::: compiles a database of names and CC numbers ::: and mail order catalogs that they've ordered from is also a "hacker." Even ::: though s/he could do the same thing with a ::: notebook and a pen/pencil. . . ::: ::: Using your own analogy admin/security tools are just admin/security tools ::: until someone uses them to gain unauthorized ::: access to a computer that they wouldn't normally have access to. . . Correct? ::: ::: Herman : : Does this mean that I've gotten something "right" here??? : : Herman : : : *** END PGP VERIFIED MESSAGE *** -----BEGIN PGP SIGNATURE----- Version: PGP 8.0.3 iQA/AwUBQ1XCPR/i52nbE9vTEQKvNACfUyd+7vhryiROKgUyuz3bOa8oolgAoIow vjgr70Pc+ln8Sf3crKmnTi6W =iON5 -----END PGP SIGNATURE-----
Current thread:
- RE: Wireless Security, (continued)
- RE: Wireless Security Herman Frederick Ebeling, Jr. (Oct 17)
- RE: Wireless Security Herman Frederick Ebeling, Jr. (Oct 18)
- RE: RE: Wireless Security Herman Frederick Ebeling, Jr. (Oct 18)
- Re: RE: Wireless Security Dave Bush (Oct 18)
- Re: RE: Wireless Security Alloishus BeauMains (Oct 21)
- Re: RE: Wireless Security Dave Bush (Oct 18)
- RE: Wireless Security Herman Frederick Ebeling, Jr. (Oct 18)
- Re: Wireless Security Austin Murkland (Oct 18)
- RE: Wireless Security Herman Frederick Ebeling, Jr. (Oct 21)
- RE: Wireless Security David Gillett (Oct 21)
- Re: Wireless Security Austin Murkland (Oct 18)
- RE: Wireless Security Drumm, Daniel (Oct 21)
- RE: RE: Wireless Security Herman Frederick Ebeling, Jr. (Oct 21)
- RE: Wireless Security Herman Frederick Ebeling, Jr. (Oct 24)
- RE: Wireless Security Burton Strauss (Oct 24)