Having fun with those stealing your unsecured bandwidth

In our classes we debate the legal challenges that surround securing wireless networks. I don't think we can legally hold non-computer experts accountable to misconfigured networks, I would prefer to ley this problem get solved in the marketplace by letting more secure WiFi products compete to solve these issues. We don't talk much about the other side; What rights do you have to a computer that has logged into your unsecured network but doesn't belong there?

While I don't advocate retaliation on any level in security, but I have to admit this example is pretty clever.

Upside-Down-Ternet







<< Home

This page is powered by Blogger. Isn't yours?