Fun way to mess with wireless freeloaders….



Some people spend a lot of time finding ways to block the freeloaders from their wireless internet. Others find fun ways to mess with them…. They start off by settup up dhcpd.conf to carve out two subnets a “good” one with known mac addresses and an untrusted…. then the fun begins with some proxy side image manipulation. Either upside down images, blurry images, etc. I wonder why you don’t just take it a step further…. block images entirely and replace with a jpg of your choice. IF you have a very BUSY accesspoint with freeloaders – maybe you could even sell an ad…. or do a captive portal for the untrusted crowd that redirects through a page that says…. “Uploading personal data…. Please wait…. Credit Card info transfered…. browsing history transfered….. email history transfered…. My Documents in progress…” Of course, it would be actually doing this…


The sad thing is that I don’t know how many people would really pay attention and be concerned. “Boy my home page is taking a while to load… I wish that guy would get a decent download speed on his cable….” “What’s all that about uploading personal information?” “Probably just some technical browser update or something…”

The bottom line here that this SHOULD drive home to people is that if you use an unknown/untrusted wireless access point they can do JUST ABOUT anything to the information going through unless there is END TO END encryption. (That’s true for just about any network connection actually – it’s just that wireless gives so MANY more possibilities for mischief.)

Oh, and with regards to end to end encryption – it’s worth looking at your security certificates if there’s any failure to identify the authenticity.

Related Posts

Blog Traffic Exchange Related Posts
  • Opera security patch I saw this earlier today, but had thought it was an issue already covered (just before Thanksgiving there was an opera security update I think.) Anyway... Secunia has an advisory on a security vulnerability in the Opera Web browser. Users are encouraged to upgrade to v. 8.51. The SecurityFix has......
  • Facebook Fan Check Application Virus Just as last week, the facebook fan check application virus rumor is making the rounds again. And also just as last week people searching for information on the facebook fan check virus are running into some of the top search results hosting malware. There were several attack sites up last......
  • Wireless Driver Vulnerabilities There are a couple notes to pass along with regards to some pretty serious vulnerabilities in various wireless network adapter drivers. First, Sans has information on some Intel Centrino updates that resolve some vulnerabilities that would affect the Windows Centrino driver and the ProSet management software. F-secure chimes in on......
Blog Traffic Exchange Related Websites
  • The 3 Reasons why Mint Collectible Coins Are Valuable The Sheldon grading scale is by and large the most used grading scale for dealing with collecting coins. The top of the grading scale is reserved for those coins which can hold the status of being in mint state. These coins are the most valuable of all of the coins......
  • The Opposite of Successful Blogging There is an opposite to successful blogging, which is blogging that drives your readers in the wrong direction. Take a look at this list of things that you can do to drive readers away so that you will have a better understanding of what you need to do in order......
  • The Real Cost of Credit Cards I get bashed often about my attitude towards credit cards. Responsible users (those who never carry a balance) are very proud of the rewards and benefits they provide. Other personal finance bloggers devote substantial time writing about the various rewards cards available to us, hoping to garner some extra income......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site