YAWNA - Yet Another Wireless Networking ArticleWritten by Erich Heintz
Continued from page 1
So here’s what Johnny does. First he configures his computer to use your wireless network instead of his own, taking an extra minute to make sure that he spoofs any information that may uniquely identify his computer. Next, he searches web a bit for perfect online vendor to acquire his product. He avoids biggest and smallest vendors. The largest vendors tend to be very thorough in credit card validation as they have solid resources at their disposal. The smallest vendors are often quite thorough as well as loss due to fraudulent transactions impacts them dramatically. He searches for a middle of road vendor, one with a reputation for lousy customer service, in hopes they won’t bother verifying that shipping address is valid for credit card being used. Once he locates a suitable vendor he places order and has it shipped to your next door neighbor. Why there? Well, he doesn’t actually know that wireless network he is using is yours and doesn’t really care. What he does know is your next-door neighbor leaves house every morning promptly at 7:30 and doesn’t return until at least 6:00 in evening. This leaves opportunity to safely retrieve “tried to deliver while you were out” slip that will be left behind by parcel delivery driver. The following morning he will reattach delivery slip to door, with instructions to leave package on doorstep. A few hours later he picks up his package, leaving no trail leading back to him. Conclusion ---------- More than likely this single incident will disappear without further involving you or Johnny. The owner of credit card will dispute charge, and credit card company or vendor will end up eating loss and story ends. Of course, there’s always chance that some motivated investigator will follow trail back through your internet provider and ultimately to you. You may not be going to jail over it, but you’ll likely be having a few uncomfortable discussions with some gentlemen wearing badges. The fact is this isn’t an original scenario. This type of scam has been run over and over again and dates back decades before internet explosion. It has dozens of variations and permutations. What is important is that this time around you have become part of equation. By ignorance or by apathy you are in middle of something bad that you never imagined could have happened.

About The Author ---------------- Erich currently specializes in providing network and security solutions for small to medium businesses that frequently have to resolve the conflict of need versus budget. His commitment to precision and excellence is eclipsed only by his fascination with gadgets, particularly ones that are shiny, or that blink, or that beep. If you would like to contact Erich you can e-mail him at erich.heintz@gmail.com.
| | What is Wiki?Written by S. Housley
Continued from page 1
What can Wikis be used for? Wikis have spawned some interesting uses, including development of knowledge bases on both intranets and Internet. Product documentation, tutorials and online FAQs are increasingly created using Wiki collaboration. Other collaborative Wiki projects that have been spawned include a Wiki dictionary and directory of famous quotes. Wikitionary - Wikitionary, a collaborative project to produce a free multilingual dictionary in every language, with definitions, etymologies, pronunciations and quotations. - http://en.wiktionary.org Wiki Quote - Wikiquote, a free online compendium of quotations in every language, including sources (where known), and translations of non-English quotes. - http://en.wikiquote.org Ultimately, Wikis are ideally suited for internal corporate projects or committee groups, when all individuals participating have same goals in mind. Potential exists for significant abuse when Wikis remain open in competitive areas. Overall, Wikis are influential, shaping collaborative online content development, and are likely to become increasingly popular. Sadly, as a Wiki's popularity grows, it is likely Wiki abuse will grow.

About the Author: Sharon Housley manages marketing for FeedForAll http://www.feedforall.com software for creating, editing, publishing RSS feeds and podcasts. In addition Sharon manages marketing for NotePage http://www.notepage.net a wireless text messaging software company.
|