Security Basics mailing list archives
RE: Wireless Security (Part 2)
From: "Craig Wright" <cwright () bdosyd com au>
Date: Wed, 17 May 2006 08:18:17 +1000
Hi You never have the right to attack back. Though there are common law remedies that allow a right to be corrected, this is not one. An example would be in a case of conversion (theft) - take as an example you had a bike stolen. You later see the bike resting on the side of a building where you have to cross a property to get it. You may take the bike back in which you have committed an act of trespass in doing so as long as there are no other breaches. This could be thwarted if there was a padlock on the bike. You have no rights to break the lock to get your bike back and if you do you may be held liable yourself. In criminal cases the state will generally have to demonstrate that the warning message was at least downloaded/accessed. There is a far higher level of proof in criminal cases than civil. In a civil case proof that the message was published in a reasonably visible location will be satisfactory. The warning itself is not enough legally to have the right to scan another network or system. If you have an "accept" button this may give the right to a scan if the scan is done within the terms of the agreement. You have to get the attacker to agree to this explicitly. Regards, Craig -----Original Message----- From: Ebeling, Jr., Herman Frederick [mailto:hfebelingjr () lycos com] Sent: Tuesday, 16 May 2006 7:34 AM To: security-basics () securityfocus com Subject: Wireless Security (Part 2) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 A few months back we had a discussion going about whether or not a person who has setup a Wi-Fi network for their and their families use. And IF someone illegally connects to said network if the person who setup the network has the right to go into the other person's computer to find out who they are. The consensus is/was that sadly no the person who setup the Wi-Fi network doesn't have the right to go into the intruder's computer to find out who they are. What IF the person who sets up the Wi-Fi network has a web page, or a dialog box that is displayed that says the following whenever a new computer signs onto the network: WARNING You have connected to a PRIVATE COMPUTER NETWORK IF you were NOT invited to join the network then leave now. IF you continue to use the network, know that by doing so you consent to having your computer inspected for the purpose of finding out who you are so that the proper authorities can be notified. IF you leave now no actions will be taken, but IF you continue then the appropriate actions WILL be taken, you have been WARNED. This is your ONLY warning, leave NOW. Also know that along with your name your computers MAC address will also be recorded, and blocked in the future. If the above is setup as a web page then the capitalized words would be in bold as well as red to catch the person's attention. Also with the above they wouldn't be able to say that they weren't warned, correct? - ----- Herman Live Long and Prosper ___________________ _-_ \==============_=_/ ____.---'---`---.____ \_ \ \----._________.----/ \ \ / / `-_-' __,--`.`-'..'-_ /____ ||- `--.____,-' -----BEGIN PGP SIGNATURE----- Version: PGP 8.0.3 Comment: Space the Final Frontier iQA/AwUBRGjzqx/i52nbE9vTEQL2VgCfa6k5g7v+iXyLAWn8x0C4puoejFIAnA0l pyeqL5W4eOfzDQCLuHEk31Q/ =c+u5 -----END PGP SIGNATURE----- Liability limited by a scheme approved under Professional Standards Legislation in respect of matters arising within those States and Territories of Australia where such legislation exists. DISCLAIMER The information contained in this email and any attachments is confidential. If you are not the intended recipient, you must not use or disclose the information. If you have received this email in error, please inform us promptly by reply email or by telephoning +61 2 9286 5555. Please delete the email and destroy any printed copy. Any views expressed in this message are those of the individual sender. You may not rely on this message as advice unless it has been electronically signed by a Partner of BDO or it is subsequently confirmed by letter or fax signed by a Partner of BDO. BDO accepts no liability for any damage caused by this email or its attachments due to viruses, interference, interception, corruption or unauthorised access.
Current thread:
- RE: Wireless Security (Part 2), (continued)
- RE: Wireless Security (Part 2) Ebeling, Jr., Herman Frederick (May 20)
- Re: Wireless Security (Part 2) Ansgar -59cobalt- Wiechers (May 20)
- RE: Wireless Security (Part 2) Ebeling, Jr., Herman Frederick (May 20)
- RE: Wireless Security (Part 2) Craig Wright (May 16)
- RE: Wireless Security (Part 2) Steve Armstrong (May 16)
- RE: Wireless Security (Part 2) Ebeling, Jr., Herman Frederick (May 17)
- RE: Wireless Security (Part 2) Ramsdell, Scott (May 16)
- RE: Wireless Security (Part 2) Bob Radvanovsky (May 16)
- Re: Wireless Security (Part 2) Robb Wait (May 20)
- RE: Wireless Security (Part 2) Bob Radvanovsky (May 16)
- RE: Wireless Security (Part 2) Craig Wright (May 17)
- RE: Wireless Security (Part 2) Craig Wright (May 17)
- RE: Wireless Security (Part 2) Murad Talukdar (May 17)
- RE: Wireless Security (Part 2) Ebeling, Jr., Herman Frederick (May 20)
- RE: Wireless Security (Part 2) Craig Wright (May 20)
- Re: Wireless Security (Part 2) Ian Scott (May 23)
- RE: Wireless Security (Part 2) Ebeling, Jr., Herman Frederick (May 23)
- Re: Wireless Security (Part 2) Ian Scott (May 23)
- Re: RE: Wireless Security (Part 2) mikem (May 20)
- RE: RE: Wireless Security (Part 2) Ebeling, Jr., Herman Frederick (May 23)
- RE: RE: Wireless Security (Part 2) Lloydm (May 23)
- Re: RE: Wireless Security (Part 2) Ansgar -59cobalt- Wiechers (May 24)
- RE: RE: Wireless Security (Part 2) Ebeling, Jr., Herman Frederick (May 23)
- RE: RE: Wireless Security (Part 2) Murad Talukdar (May 23)