1,136
edits
(A related discussion) |
|||
Line 128: | Line 128: | ||
People may also be having their Wifi used without knowing it. Many wireless routers do not alert the owners that it can be used by anyone if it has no password. Secondly, even if it has a strong password (especially WEP) I've read that these are often trivial to crack. [[User:Lumenos|Lumenos]] 03:07, 29 August 2009 (EDT) | People may also be having their Wifi used without knowing it. Many wireless routers do not alert the owners that it can be used by anyone if it has no password. Secondly, even if it has a strong password (especially WEP) I've read that these are often trivial to crack. [[User:Lumenos|Lumenos]] 03:07, 29 August 2009 (EDT) | ||
:You can secure your router well with WEP. Anyway, how many zombie computers are there going to be attacking Wikiindex? Think sensibly. [[User:Phantom Hoover|Phantom Hoover]] 04:51, 29 August 2009 (EDT) | :You can secure your router well with WEP. Anyway, how many zombie computers are there going to be attacking Wikiindex? Think sensibly. [[User:Phantom Hoover|Phantom Hoover]] 04:51, 29 August 2009 (EDT) | ||
::Perhaps you are aware of how to prevent this, "In 2005, a group from the U.S. Federal Bureau of Investigation gave a demonstration where they cracked a WEP-protected network in 3 minutes using publicly available tools."[http://www.smallnetbuilder.com/content/view/24251/100/]? (It doesn't mention the password strength but appears as if it doesn't matter.) [[User:Lumenos|Lumenos]] 05:24, 29 August 2009 (EDT) | ::Perhaps you are aware of how to prevent this, "In 2005, a group from the U.S. Federal Bureau of Investigation gave a demonstration where they cracked a WEP-protected network in 3 minutes using publicly available tools."[http://www.smallnetbuilder.com/content/view/24251/100/]? (<del>It doesn't mention</del>[I didn't notice anything about] the password strength but appears as if it doesn't matter.) [[User:Lumenos|Lumenos]] 05:24, 29 August 2009 (EDT)(Updated [[User:Lumenos|Lumenos]] 07:05, 6 September 2009 (EDT)) | ||
::I've not a clue as to the intentions of the, oh what shall we call them, the "black crackers". I heard the zombies were popular for spam. How does one become informed as to all of the precise motivations of <del>some mischievous kid who knows how to search the Internet</del> underground criminals who presumably operate using obfuscation techniques? [[User:Lumenos|Lumenos]] 05:24, 29 August 2009 (EDT) | ::I've not a clue as to the intentions of the, oh what shall we call them, the "black crackers". I heard the zombies were popular for spam. How does one become informed as to all of the precise motivations of <del>some mischievous kid who knows how to search the Internet</del> underground criminals who presumably operate using obfuscation techniques? [[User:Lumenos|Lumenos]] 05:24, 29 August 2009 (EDT) | ||
:::Sorry, typo; I meant WPA. You ''really'' don't have a vandal problem here. You have only a few edits from non-logged in users a day, so it is very unlikely that there is a hacker conspiracy hell bent on destroying your site. [[User:Phantom Hoover|Phantom Hoover]] 07:38, 29 August 2009 (EDT) | :::Sorry, typo; I meant WPA. You ''really'' don't have a vandal problem here. You have only a few edits from non-logged in users a day, so it is very unlikely that there is a hacker conspiracy hell bent on destroying your site. [[User:Phantom Hoover|Phantom Hoover]] 07:38, 29 August 2009 (EDT) |
edits