Re: Where is the Wireless line?

From: Harry Hoffman (hhoffman@ip-solutions.net)
Date: Wed Sep 05 2007 - 08:55:11 EDT


Umm, before you go through all of that why don't you walk in and ask to
speak with their IT person.

Explain the situation and walk them through the problems. You may find
out that they are completely overworked, possibly under-skilled and may
appreciate your helping hand.

If they don't it's no skin off of your back.

And yeah... it's wrong (and illegal in some places) to access the
network and use their resources (network, printer, toner, paper) without
their permission.

You'd think someone from a organization that claims to be "Christian"
would already know that stealing is wrong.

Barry Fawthrop wrote:
> Hi All
>
> Where does the wireless line being and end with regards to "illegal access"
>
> Concept:
>
> If company A has a wireless network (unprotected) No Encryption,
> Broadcasting SSID, Default Acesss point user_name and password.
>
> You know they need security. So is it wrong to
> access the network and print to their printer a document
> saying "You need security, I just accessed your network"
>
> Or would one have to have permission first!.
> I'm not talking about accessing data and files, but using the printer
> and printing on their paper that they need help!!!.
> And then going in and asking for a security contract having proved
> beyond doubt that they need it.
>
> Otherwise before hand it is just your word & experience against theirs
> and obviously they are not going to admit they need help without being
> shown?
>
> Curious to hear your comments, or possible solutions to the same/similar
> problems??
>
> Thanks
> Barry
>
> ------------------------------------------------------------------------
> This list is sponsored by: Cenzic
>
> Need to secure your web apps NOW?
> Cenzic finds more, "real" vulnerabilities fast.
> Click to try it, buy it or download a solution FREE today!
>
> http://www.cenzic.com/downloads
> ------------------------------------------------------------------------
>

------------------------------------------------------------------------
This list is sponsored by: Cenzic

Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!

http://www.cenzic.com/downloads
------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:58:06 EDT