Archived from groups: microsoft.public.windows.networking.wireless (
More info?)
Mr. Jones, my ISP has a monopoly in my town which during the school year is
occupied by 30000+ college students apartments are dense. The cable internet
provider in my area charges for extra bandwidth over a set limit, so if
there are lazy worthless trash just piggy backing on a connection the owner
of the connection is forced to pay the additional charges [loss or
inconvenience]. Did you even read the article that this thread was started
about? I'm sure that when you get a job and pay for your own internet that
you wouldn't want someone to steal it just because they were capable of
doing so. Spoken like someone who thinks that the world owes them something.
Reply to the thread, don't send me an email so all users may benefit. Stop
wasting MY bandwidth.
http://www.cnn.com/2005/LAW/07/07/wi.fi.theft.ap/index.html
----------------------------------------------------------------------------
----
From: Ian Jones [mailto:ianrj@zoom.co.uk]
Sent: Tuesday, July 12, 2005 17:42
To: Friendly
Subject: Re: Illegal WAP Connection
----- Original Message -----
From: "Friendly"
Newsgroups: microsoft.public.windows.networking.wireless
Sent: Monday, July 11, 2005 5:40 PM
Subject: Re: Illegal WAP Connection
> Deliberate flagrant violators should be prosecuted at least for something,
Pathetic - something, but you do not know what.
Is it illegal to receive a radio signal? Just to piggy back on someone's
bandwidth doesn't seem much of a crime to me. Especially if they are stupid
enough to invite you in with an unsecured connection.
Surely, for a prosecution to be successful, someone has to have endured some
sort of loss or inconvenience?
has notified the sender that this message has been received.
"Friendly" <derekthestud@hotmail.com> wrote in message
news:uJNW7cjhFHA.1948@TK2MSFTNGP12.phx.gbl...
> Deliberate flagrant violators should be prosecuted at least for something,
> however the law doesn't take into account how utterly oblivous the general
> computer using population is to way wireless internet works. to prove it
go
> to an appartment complex and look at how many unsecured wireless networks
> there are. People care about security the just dont know how to do
anything
> about it. You can be connected to a wireless network with zero to minimal
> user intervention. It just seems arbitrary, like the file sharing cases.
>
>
begin 666 vDh.gif
M1TE&.#EA9 `0`.9_`%5554Q,3(6%A;&QL=+2TN&XN/;V]F!@8/'Q\?KZ^EU=
M72PL+//S\U%149V=G:ZNKHF)B<'!P?3T]*6EI1D9&;JZNLK*RB,C(^;#P]^S
MLY65E?CX^.CHZ,;&QG%Q<>/CX[I=7:JJJO3EY>K-S?;IZ=C8V.3DY,1U==&1
MD=:>GLV*BJT]/;--3>OKZ_OV]N;FYM_?WVYN;J8M+9H1$<A^?D! 0+=45 8&
M!C$Q,:&AH61D9+:VML3$Q-O;VUE96=;6UCP\//[\_/W[^\C(R+E;6_+>WH&!
M@;V]O9J:FG1T=,_/S\[.SI*2DD1$1,!L;,^&ANC*ROCN[C@X.+.SLWQ\?&IJ
M:K!%18.#@\J!@1 0$'EY><)P<)B8F+M@8-34U,S,S(^/C_KS\UM;6]FEI>S3
MT\N$A'=W=]>AH<9Z>JLY.>WM[?W]_?S\_._O[^[N[NSL[,R&AG]_?^W4U.O0
MT-NJJN'AX;]H:/SY^=S<W/?M[
T-,^%A?+AX=VPL ```/___R'Y! $``'\`
M+ ````!D`! ```?_@'^"@X0DA(>(B8J+C(V.CXY1)V5G*9:7F&=SD(IL:HP2
M!HAL;FJFIF\2A*&-;'4E'VN%(W-S(X8H:2N[O+V[>C,HA#T5B6T[AU,*R\B$
M"0YB/F('$&^#)1<4%!?9%#&$<4B+"1HX-WXW..)_9'V&0BY"?T&0=#-R@P,U
MB0--A!T`\"2PT*"8H!8-JG1HP<'"E29'!,%H`@2'GRQ I$ 8Q( "C@2).#3Q
M<T$'%3%9_/A00R//'PPN./TILDF&,$%@LI1 I&,!@D%5(@QR`T/0A@`:$"V1
M(G30#Y6()OCQTXR0@1I^C/P49$*!GRDJ!!4X@>%1D#$G\%DI,\A#$B.'_TH<
MT&%AD(^BB"!\2V2AZA\"?@`<6@/DQ@U_AR!D1;3A"!LX@XJ@H6%H$10[*&+^
ML0+Y#P,%/0!L%21@`I,<@\S />2FB0E(@ 43XN%'0 P_=0<AV+9A$8U#=&ST
M2>1"!1$HA#@+(G#@CYD0@R2(WI%D4!L=.I00VN^Q#/FY\^'&C^Z .?J@P
MVB*+D(@9+/ -RB"#!2(K3P0]4-^AN: !'OQEWB /)-2#(%RL-D@"'+S08!OM
M_148(7C<(%L#-^PD2 A^3' (#UPX(*(=\A!21A<TK( &!@6 P$(9-F1P"'Z"
M& $=&P!HJ ,/?TC'P2$)(%$#,DP(<,@'/C2@)/\.! SRW2!:^-&!(!;XL=<?
M#W1XR %33=7%'8.$L45G(IS @@THR"-"%RDDE]\?!VCWAP8;E0``&X(H,"4B
M)=2 0 7^#;*&`:$<Q>-R$PJB!@4WQ)!$$C'<D,5K?RCA1W7#1&!!`'[8H)D(
M3M!Q2(F#W$&#"NW1B( 86WT`P!H0K/-'' XHX@,/##11AR((!-""DXG^@01)
MW'"S0&U&X4"!&XE(<0$+,9&Q!7*/I(!%%)OM\<<2@?Y1Q0X*_*C?-Q9\<0@`
M7@CK0X2$F&$DL+(EH*P)!M1K0 L+4-"&?H&)0@@3M<D011@J\"%3`6/\D49^
M(5Q!2 07Q$$(`8)94(.F-8+DH$-[21P@KB!N).$#2/ *4D%ZB&C@!Q>#4.$'
M$%/ \((%5;S,``LGR'0(%#.4E<0#A+ AQ9Z"]/J:`S4P$8('`'S\!QA-Q#&!
M`TDT045OA%@
!\)8(47(6]D0<%H3*0DZ50`_!I%%U: 0,3;<,<M]]MNR_ F
M`:,)\@/6@PRQ
@V.@O(1],8(0`(7R0" (/U+7!`$TA8D$(?W/E0!4Z"$!T
#( `[
`
end