Welcome to WebmasterWorld Guest from 184.108.40.206
Forum Moderators: bakedjake
You need to be careful. If someone finds you on their network, they can do some bad things to you.
There are plenty of other sites on the net that talk about WarDriving, I'd suggest you go there to find some more info.
I was sitting down by the pool the other day plugged into my wireless network. I decided to view all networks within my range. Whew, talk about a mess. There were over 50 unsecured wireless networks in my range. Many of those are people who purchased a wireless router and haven't secured it. They just plugged it in right out of the box. Yikes!
It is possibly illegal to use someone else's wireless bandwidth, but that is still unclear.
Then all of a sudden 2 days of trouble - dropped connections, AIM logging out, slowness etc. After 2 days I realised I was connecting throught a neighbours network and not mine :-(
Simple fix move my connection up the list of prefered networks, trouble free internet again.
What you are doing is called WarDriving.
Actually what he is doing is not called war driving. War driving is the act of locating access points without connecting to them. War Driving is completely legal. Connecting to someone elses access point on purpose to use their network without permission is illegal.
A man got arrested for logging onto someone elses (unsecured) access point.
What's also interesting is this concept of "evil twin" attack which I hadn't come across before reading the SP Times article:-
A more recent threat to emerge is the "evil twin" attack. A person with a wireless-equipped laptop can show up at, say, a coffee shop or airport and overpower the local Wi-Fi hotspot. The person then eavesdrops on unsuspecting computer users who connect to the bogus network.
Not all encryption is rock solid, either. One of the most common methods called WEP, or Wired Equivalent Privacy, is better than nothing but still can be cracked using a program available on the Web.
If that is the case, what should we all be using?