stupid internet question

Discussion in 'Questions From New Drivers' started by midget28, Dec 16, 2010.

  1. Flying Finn

    Flying Finn Heavy Load Member

    972
    557
    Jun 22, 2010
    Ontario, Canada
    0
    The POP protocol is NOT an encrypted and secure protocol. Data is passed in clear text. Cell phones are also not encrypted. Although more difficult and requiring better scanners with the digital phones than the old analog ones to monitor. They are also sending data via clear text.

    A good network card setup in promiscuous mode will capture all of your data from your portable hotspot as well.

    Understand that the only secure network is one that is completely closed (hardwired) with no broadcasting wireless devices or Internet connections. Using the Internet, no matter how you attach to it is a risk upon itself. All you can do is try to protect your data as best you can.
     
  2. Truckers Report Jobs

    Trucking Jobs in 30 seconds

    Every month 400 people find a job with the help of TruckersReport.

  3. MrMustard

    MrMustard Road Train Member

    1,003
    529
    Dec 11, 2008
    Dayton, Ohio
    0
    True, but Gmail IS encrypted if you set it up for POP. Yahoo can't be set up for POP unless you pay for it, so I can't say if they are encypted, but I can tell you Gmail IS. No one has ever, as far as I know, hacked into a 3g connection, and the MifI sold by the 3g carriers is pretty safe if you have WPA enabled so only you can log on to it.
     
  4. Flying Finn

    Flying Finn Heavy Load Member

    972
    557
    Jun 22, 2010
    Ontario, Canada
    0
    POP itself is not an encrypted protocol. Unless you enable SSL or TLS, which is what Gmail recommends you do. That is the distinction that non-techie users will misunderstand. They may end up thinking that just because they use POP their e-mail is encrypted. I have done the supporting ID10T end users long enough to know that even being specific sometimes doesn't help. :biggrin_25523:
     
  5. Rollover the Original

    Rollover the Original Road Train Member

    3,206
    2,712
    Jul 1, 2009
    Springfield,MO
    0
    Yeah, he did have too much time on his hands as that WAS his job aparently! He just stayed at the trough too long and got caught!

    Me, I do have too much time on mine as well as sitting at this desk at home on the disabled list pretty much bites!
    This has turrned into a good thread though!
     
    Flying Finn Thanks this.
  6. ZippyNH

    ZippyNH Medium Load Member

    408
    121
    Aug 8, 2010
    Southern NH
    0
    IF you want to have privte WIFI , with no risk of being spied on...and I will tell you, the "man in the middle" type of attack or "honey Pot" type of set up is kinda common as described above , with simply recording packets even more common...., but 99% of what is done online usually has proper security (sites like G-mail have recently changed all e-mail, not just loin to secure...Yahoo is a bit more problematic last time I checked)......FULL encryption for anything involving bank #'s, passwords, etc....but if you are paranoid about somebody spying on the web-pages/porn you look at, there are service you can buy for a nominal fee (a few are free, or very cheap) to encrypt all you transmissions to a central location, where then it is dumped onto the internet, making spying on you harder...Private VPN, or personal VPN is usually in the name...but this will slow down your browsing...it is useful for getting around "filtered" internet access that limits access to certain sites or services (file-sharing or porn) !!
     
    Wargames Thanks this.
  7. MrMustard

    MrMustard Road Train Member

    1,003
    529
    Dec 11, 2008
    Dayton, Ohio
    0
    It literally takes HOURS to crack WPA. As a driver, I'm sitting around in one area for ten hours at most, and out of those ten hours, my computer will be turned on maybe three of those hours. I think WPA encryption is adequate in our circumstances. If I had a stationary router in crowded apartment building, I'd probably be more apt to take your advice.

    But, if you are running Windows, a great way to do what you just described is Hotspot Shield

    http://hotspotshield.com/

    This is also a way to get around the blocking of sites that a hotspot may have blocked. For instance, the New York Thruway service area blocks all movie download sites, as well as porn sites, use this and you can get to them.
     
    Wargames Thanks this.
  8. producepimp

    producepimp Light Load Member

    177
    4
    Jul 16, 2010
    0
     
  9. chompi

    chompi Road Train Member

    5,653
    3,485
    Jun 21, 2008
    Deland, FL
    0
    What a coincidence! There was just a news special on what you guys are talking about. (wifi) There are actually hackers who go to like airports and set up fake wifi servers. The people who are in the airport get on their laptop and look up the wifi providers, well they name it something like freeairportwifi which gets the peoples attention. They start using it and the hackers have access to their computers. They download spyware and now they have a constant way to get into others secure stuff. The news reporter was telling people to make sure that you ask airport staff who the wifi provider is so that you don't get hacked!
     
  10. Wargames

    Wargames Captain Crusty

    3,215
    7,388
    Jul 22, 2010
    WI.
    0
    ZippyNH, thanks, doing research also,


    First off, I NEVER do anything on a public WiFi network that I would not want the guy sitting in the next booth to see on his screen. Even at home, I do our online banking Only when connected to the wired router & never on the actual WiFi signal here at the house.


    Since I don't do anything at a coffee shop that I care if anyone sees, I don't use any special security software other than my built-in XP firewall and Anti-Virus software.


    What I would use, if using Wi-Fi anywhere when using an 'Open Network' such as a coffee shop where the Wi-Fi is advertised as 'Free', I would use what is called a VPN or Virtual Private Network.


    http://www.pcworld.com/article/210562/how_to_set_up_vpn_in_windows_7.html


    This is the software we use, it is relatively easy to set-up, stable and available at no cost = free.


    https://secure.logmein.com/products/hamachi2/


    http://en.wikipedia.org/wiki/LogMeIn
     
  11. Wargames

    Wargames Captain Crusty

    3,215
    7,388
    Jul 22, 2010
    WI.
    0
    Key-logging software has been around a long time with a large number of programs free and quite good. http://en.wikipedia.org/wiki/Keystroke_logging#Software-based_keyloggers


    Easy way to check if some guy in the truck-stop parking lot (or across the street at the coffee shop parking lot) has set up a capture site - before going online with your laptop WiFi, look at the list of available networks, if two (2) have the exact same name, you are guaranteed one of them is the bad guy. And if one is listed as something like "T&A South Atlanta, GA - Free" and another right under it is listed as "South Atlanta, GA - Free" (which is almost the same) - likely the second one is suspect. Although could be legitimate, I would not use it.


    Best bet, install a VPN client and be safe.
    Yea I know, it's a bit of a hassle setting up and turning on each time.
     
  • Truckers Report Jobs

    Trucking Jobs in 30 seconds

    Every month 400 people find a job with the help of TruckersReport.