|
Posted by Tricky Dicky on 04/16/06 21:12
"POD {ҿ}" <DONT.EVEN.TRY.IT@DEADSPAM.COM> wrote in message
news:Xns97A7D7B40EEDDWeLovePOD@212.23.3.119...
> "Tricky Dicky" <tricky@nospam.clara.co.uk> once tried to test me. I ate
> their liver with some fava beans and a nice chianti
>
>> Having been using my router for a few months now just for its hardware
>> firewall and ethernet connection I was appalled to just find that
>> three other computer had decided to join my network!
>>
>> I can understand that people want to use these items straight out of
>> the box and for their connection to be automatically detected but
>> surely it is not too much to expect a little bit of security rather
>> than the "hey come and connect to me" signal that is broadcast
>>
>> Tricky
>>
>>
>>
>
> Ease of use, just plug it in and go, it's up to you to set up the security
> key, because if they did set it up, it would be oh so easy for people to
> try the default key and get on anyway, this way, you have to pick a key.
But I was not even using the wireless features of the router! Which is what
bugs me.
Btw, I would love to trace who the people were who decided that my
inadvertently open connection was worth using. I still have their MAC
addresses if that helps
Tricky
Navigation:
[Reply to this message]
|