willay
Moderator Organiser: South East, National Events Premium Member
Registered: 10th Nov 02
Location: Roydon, Essex
User status: Offline
|
Sending a print job to a printer on a network you can access isnt the most taxing task!!
|
Corsa_Quadz
Member
Registered: 24th Feb 08
Location:
User status: Offline
|
i piggy back onto peoples wireless with an I.P address generator, so theres no way of gettin caught
|
John
Member
Registered: 30th Jun 03
User status: Offline
|
What do you mean an IP address generator?
If the router is logging it'll have your mac address.
|
Mussolini
Banned
Registered: 15th Aug 08
User status: Offline
|
ip address generator
|
Paul_J
Member
Registered: 6th Jun 02
Location: London
User status: Offline
|
quote: Originally posted by nova_gteuk
quote: Originally posted by John
Nova you have no idea what you are talking about.
If you are dealing with card/bank details it uses SSL as willay says, as long as you are on a legit site nobody can see whats happening in that transaction apart from the people on both ends.
The real hustle makes a lot of stuff up.
Even though exactly what they did has been in the news with people getting their details that easy.
There was a guy in swansea in a cybercafe he took his laptop in and sat there collecting details,he got seven years for fraud after being caught 
The real hustle always make things look a lot simpler than it is. They're demonstrating that 'in theory' doing this and doing that = this, therefore be aware.
However, in reality half their techniques would not actually work.
For example I've seen them demonstrate key loggers and setting a laptop as a host for wireless connections, with other people joining their wireless network and their info being logged.
But in reality, things like firewalls, types of security on their transactions, etc etc would stop this.
|
ed
Member
Registered: 10th Sep 03
User status: Offline
|
quote: Originally posted by Paul_J
quote: Originally posted by Wrighty
Buy your music / media then, if you like it then surly you should be supporting them by not downloading illegal rips
Yeh but my gripe is, how do you know if you'll like something or not before buying it?
For example a music album, you only hear a single or two, before the release of an album. The album is marketted on the back of the 2 successful singles and as such you have no idea what the othet tracks will be like.
You buy the album. The 2 singles you know are great (if a little bit stale now), but the rest of the album is full of shit songs / filler tracks. money down the shitter.
iTunes lets you preview all of the songs on an album before you buy it
|
ed
Member
Registered: 10th Sep 03
User status: Offline
|
But I have noticed that the thread has divulged and novagte_uk is arguing about something he knows nothing about again.
[Edited on 01-09-2008 by ed]
|
Dom
Member
Registered: 13th Sep 03
User status: Offline
|
quote: Originally posted by Corsa_Quadz
i piggy back onto peoples wireless with an I.P address generator, so theres no way of gettin caught
what the fuck is a ip address generator when it's at home? FPMSL 
and unless you're changing your mac address (possible but not easy depending on your NIC) then you're still be logged and can be traced.
only way to be secure is to use encryption
|
ed
Member
Registered: 10th Sep 03
User status: Offline
|
Lease a line and encrypt everything. We'll stop the man somehow     
[Edited on 01-09-2008 by ed]
|
willay
Moderator Organiser: South East, National Events Premium Member
Registered: 10th Nov 02
Location: Roydon, Essex
User status: Offline
|
encrytpion/serious of proxies or perhaps doing it via a line/country that doesnt have the strictest policies.
|
willay
Moderator Organiser: South East, National Events Premium Member
Registered: 10th Nov 02
Location: Roydon, Essex
User status: Offline
|
quote: Originally posted by John
What do you mean an IP address generator?
If the router is logging it'll have your mac address.
maybe he means DHCP? 
Yes but most routers will flush out all the logs when they get rebooted, unless its logging to a syslog server, which it wont because if you go to the lenghts of using syslog then you're going to secure your wireless AP
|