Senior Member
Join Date: Jul 2004
Location: london and københavn
|
Can anyone recommend a decent network monitoring app?
My wireless is unprotected and someone's stealing it. I don't actually mind too much, but I'm curious to know who and how many. Ta. gibberish |
quote |
‽
|
You'd probably have to monitor it from the base station, not from a particular client.
If it's an Apple AirPort base station, http://www.trulycertifiable.com/prod...ortmonitor.php might help. Apparently, AirPort supports SNMP as a general protocol for status information. |
quote |
Rocket Surgeon
Join Date: Feb 2005
Location: The Canadark
|
Spotlight "Airport Client Monitor" - I'm pretty sure that will tell you the Mac address of whoever is connected. Whether that Mac address will tell you any more is debateable, of course.
Last edited by Bryson : 2007-01-15 at 06:47. |
quote |
Selfish Heathen
Join Date: May 2004
Location: Zone of Pain
|
MAC address, that is.
|
quote |
Rocket Surgeon
Join Date: Feb 2005
Location: The Canadark
|
I thought that was what I typed. Perhaps some kind of auto-correct got me?
EDIT: Nope, just some random auto-correct in my brain that kills ALLCAPS, it turns out. |
quote |
BANNED
I am worthless beyond hope. Join Date: May 2006
|
Not to nitpick, but if you're blasting unprotected WiFi into someone else's space, I disagree with calling it "stealing." I don't see much difference between something like (unprotected) wireless internet and FM radio waves. If it's in someone's house, they're free to use it. (Now, if it's password-protected and they've hacked in, that's an entirely different story.)
(There were a couple great threads on this here about a year ago.) |
quote |
Senior Member
Join Date: Jul 2004
Location: london and københavn
|
Hmm. You're right. By 'stealing' I mean... 'using'.
|
quote |
*AD SPACE FOR SALE*
Join Date: Apr 2005
Location: Cleveland-ish, OH
|
|
quote |
Veteran Member
|
Quote:
There seems to be a lot of people on the Internet who have developed very skewed definitions of whats stealing - the kind of people who believe that downloading copyrighted music and movies is fair, "cos they are too expensive" or because "Im seeing if I like it before I buy it." |
|
quote |
Rocket Surgeon
Join Date: Feb 2005
Location: The Canadark
|
Ah. You have to go to http://www.apple.com/support/airport/ and download the "Airport Management Tools". The link is on the right under "update your software".
|
quote |
Rocket Surgeon
Join Date: Feb 2005
Location: The Canadark
|
I'd say a fairer analogy would be posting £10 notes through someones door and expecting that person not to use them. You are inserting this into other peoples homes, without protection. Although technically "stealing" I doubt any sane judge anywhere would actually uphold a prosecution for it.
|
quote |
Veteran Member
Join Date: Oct 2005
|
Why don't you just, you know, protect the network?
|
quote |
I shot the sherrif.
|
I leave my network open, and if people want to use it they're free to do so, but I can understand why you'd want to know *who* is using it. Nothing wrong with being curious.
Google is your frenemy. Caveat Emptor - Latin for tough titty I tend to interpret things in the way that's most hilarious to me |
quote |
Lord of the Rant.
Formerly turtle2472 Join Date: Mar 2005
Location: Upstate South Carolina
|
How do you protect your files? I wouldn't mind leaving my network open, but I have way to many files on my systems/network that I don't want people being able to mess with.
Louis L'Amour, “To make democracy work, we must be a nation of participants, not simply observers. One who does not vote has no right to complain.” Visit our archived Minecraft world! | Maybe someday I'll proof read, until then deal with it. |
quote |
Veteran Member
Join Date: Dec 2004
|
some people will leave the network open and then packet sniff and get valuable data, so it pays to be a bit safer on unencrypted networks
|
quote |
I shot the sherrif.
|
I don't have any file sharing enabled on any of my computers, and everything is firewalled up the wazoo.
|
quote |
Lord of the Rant.
Formerly turtle2472 Join Date: Mar 2005
Location: Upstate South Carolina
|
So you much not transfer files within your network often then, if you do, how?
Packet Sniffing huh, sounds like something at a frat party. |
quote |
Thunderbolt, fuck yeah!
Join Date: Jan 2005
Location: Denmark
|
Quote:
The FBI will probably figure out it wasn't you, but perhaps they might also have bashed down your front door of it's hinges in the process. No f***'er are getting free beer at my place! Unless they are my friends of course |
|
quote |
Rocket Surgeon
Join Date: Feb 2005
Location: The Canadark
|
|
quote |
hustlin
Join Date: May 2004
|
Here in the US, the legality is murky. Personally, I have some minor ethical issues with accessing an open network, but I think it's unequivocally wrong to sniff out a key and gain access to an encrypted network.
Quote:
Quote:
Honestly, I'd probably say "stealing" when making a casual comment like Hassan did, but the fact of the matter is that it's an inaccurate colloquialism. Quote:
|
|||
quote |
Veteran Member
|
Quote:
|
|
quote |
hustlin
Join Date: May 2004
|
Use a dictionary, ffs. When you are talking about copyrighted material it's *copyright infringement,* and it's not even criminal in most cases. I don't know or care about your laws in the UK, but you are just wrong when talking about US law or the actual meaning of "theft/larceny/stealing."
|
quote |
Less than Stellar Member
|
To me, it's like having parking space in an apartment complex and you're not using them all. Your neighbors need some parking space and you've done nothing to restrict their usage of the spots. I wouldn't mind unless they were assholes and took MY spot too or dinged my car or woke me up when they parked. I leave my network open (with my computers behind a firewall) just cause I know I appreciate finding an open network when I need access.
If it's not red and showing substantial musculature, you're wearing it wrong. |
quote |
Veteran Member
|
Quote:
Autodata: Each to his own, I guess that we will not agree over this one. |
|
quote |
careful with axes
Join Date: May 2004
Location: Hillsborough, CA
|
Quote:
If you use file sharing, make sure every account has a password. Make sure you configure your password to be sent encrypted. OS X is naughty and allows full privilege file sharing even with accounts that have null passwords. Personally, I tend to tunnel most file transfers between computers via SSH. It's faster for me anyway. |
|
quote |
Lord of the Rant.
Formerly turtle2472 Join Date: Mar 2005
Location: Upstate South Carolina
|
Quote:
So how do you tunnel? And are you only going between Mac's? Louis L'Amour, “To make democracy work, we must be a nation of participants, not simply observers. One who does not vote has no right to complain.” Visit our archived Minecraft world! | Maybe someday I'll proof read, until then deal with it. |
|
quote |
BANNED
I am worthless beyond hope. Join Date: May 2006
|
Quote:
Again, this is mostly an academic discussion for me. I've never leeched off someone's network knowingly, but I have logged on a couple times by mistake, and the idea I could be criminally prosecuted for having done so -- as some people seem to advocate, and as a few localities actually tried to do last year -- seems like the height of absurdity. (In my particular case, as discussed in prior threads, I live in a dense residential/commercial area with a multitude of free and private WiFi networks. I thought I was logging into the free public WiFi but had, in fact, logged into a neighbor's home network. I discovered this on my own and doubt the neighbor even knew it happened, but a few days later I read about a guy getting arrested under similar circumstances and it seemed ridiculous.) |
|
quote |
Veteran Member
Join Date: May 2004
Location: Ottawa, ON
|
Quote:
|
|
quote |
I shot the sherrif.
|
Oh, and I should also mention to people like me at least, having any kind of security on your network means I want to get in.
Open networks I leave alone, since they're either too naive to close them or nice enough to leave them open. If I see something like "Spiderman" or some crap with WEP or WPA you can bet your ass I'm turning on all packet capturing software and logging data for days if necessary just to break into that bitch. Don't ask me why, I couldn't tell you, but it's a strange hobby. Google is your frenemy. Caveat Emptor - Latin for tough titty I tend to interpret things in the way that's most hilarious to me |
quote |
Veteran Member
Join Date: May 2004
Location: Ottawa, ON
|
Quote:
And how exactly can I set up my network to stop this? |
|
quote |
Posting Rules | Navigation |
|
Thread Tools | |
Similar Threads | ||||
Thread | Thread Starter | Forum | Replies | Last Post |
Any way to cache an running app completely in swap space? | atomicbartbeans | Genius Bar | 6 | 2006-06-15 11:59 |
File association to app was screwed.. what do you think? | Koodari | Genius Bar | 0 | 2005-09-17 05:10 |
Linksys vs. Netgear Wireless Router | Brad | Purchasing Advice | 12 | 2005-07-13 08:27 |
Sierra Wireless PC card not Mac-compatible; what wireless PC card is? | malcolm | Purchasing Advice | 3 | 2005-06-29 09:17 |
Stone's new CoreImage App | BuonRotto | Third-Party Products | 25 | 2005-04-21 12:57 |