Monthly Archives: May 2011

May 13th 2011 @5:34pm ( how to detect a wireless intruder )


Ads by Google

Related Topics

How to Detect a Wireless Intruder

Modern wireless routers can
be vulnerable to intruders, either intentionally or accidentally. Many
wireless devices automatically seek out and connect to the strongest
signal, so it is possible that a neighbor may be connected to your
router without his realizing it. Intentional intrusions can range from
relatively benign “bandwidth borrowers” to more serious attacks aimed at
theft of identity or personal information. The best defense is strong
and frequently changed passwords on your router, wireless encryption and
monitoring of connected devices.

Difficulty:
Moderate

Instructions

things you’ll need:

  • Admin password to your router (see manufacturer’s documentation)
  • Browser software (e.g. Firefox, Internet Explorer)
  1. MAC Address Method

    • 1

      Determine the Media Access
      Controller address of every authorized wireless device on your network.
      These devices include printers, laptops, desktops, hand-held devices and any other device which attaches to your network in a wireless mode.

      Each wireless card or embedded controller in these devices has a
      unique address that identifies it to the network. No two legitimate
      devices will ever have the same MAC address.

      Windows and MAC computers have this information in the control panel for your wireless network device. For other devices, check the manufacturer’s instructions for how to locate this address.

      The address will be a 12-character field, with each character being a hexadecimal character (0-9 and A-F).

    • 2

      Log on to your router as an
      administrator. Most routers can be addressed by typing 192.168.0.1 into
      any browser. Supply the correct administrator user name and password.

      Check your documentation if you have never changed these from their default values.

    • 3

      Find the menu option for
      attached wireless devices. This will vary depending on the router
      manufacturer, so check the user manuals.

    • 4

      Compare the MAC address for each
      device listed by the router as being connected with the list of MAC
      addresses for devices that you expect to be connected. Any MAC address
      for an unexpected device may be an intruder.

    • 5

      Configure your router to only
      accept connections from known MAC addresses. Most routers offer this
      feature. Check with your user documentation for instructions.

    Other Warning Signs

    • 1

      Be alert for any suspicious activity on your network. Most often you will notice this by a slowdown of your network connection speed.

    • 2

      Check your router logs for a
      record of devices connecting and disconnecting from your network. The
      procedure to access these logs is different depending on the router
      manufacturer, so check with the user documentation.

      These logs typically show connections by MAC address, so be aware of any unexpected addresses.

    • 3

      Install software on your network
      to monitor intrusions. More sophisticated intruders may have the
      capability to “spoof” MAC addresses, meaning they can set their own MAC
      address to appear to be a device which legitimately connects to your
      network.

Ads by Google

Tips & Warnings

  • Disabling the
    router from broadcasting its ID name can reduce your vulnerability to
    wireless intrusion. Also, turning off the router when you are not using
    the network makes a network more secure, if less convenient.

References

Comments

    Helpful?
    Yes
    No

      May 13th 2011 @5:18pm ( youspoof.info / detecting a spoof) )

      FIND OUT WITH OUR GUIDE TO DETECTING A SPOOF.
      Detecting A Spoof

      There are clues for detecting a spoof for each of the several mediums
      discussed on YouSpoof.info. Find the medium you are interested in
      below and look for clues to see if you have been spoofed.

      TEXT/SMS SPOOFING & CALLER ID SPOOFING
      Text & caller ID spoofs are often difficult to detect as there is a
      limited amount of data contained within the text or voice caller ID
      message and very limited tools on most phones which enable a user to
      detect a spoof.

      Clues to detecting a spoofed text message:

      1. You receive a message from a commercial company you have a
      relationship with and you have not specifically signed up to receive
      text messages.

      2. You receive a message asking you for sensitive financial or personal.

      3. You receive a message from a recognized person, however it seems wildly out of character for the sender.

      4. You receive a message from a familiar sender but the caller ID name
      and number do not match up. For example if the message comes from “Mom”
      but the number displayed is incorrect.

      Clues to detecting a spoofed voice caller ID message:

      1. You receive a call from a representative of a commercial company you
      have a relationship with asking you for any sensitive information.

      2. If the caller ID shows a recognized person but the caller is not the recognized person.

      URL SPOOFING

      There are several clues which can help you determine if the web site you think you are visiting is a spoof.

      1. The address location bar doesn’t display the correct domain name/URL
      for the web site. This is the most commonly spoofed component of URL
      spoofing. Spoofers use a JavaScript to insert whatever domain name they
      want into the address location bar in order to deceive the user.
      For example the location bar might say www.eBay.info but the user might
      actually be at the web site www.phishingforebaylogins.net. The web page
      probably looks just like eBay’s and keeps track of all log in attempts
      in order to harvest eBay user ID and passwords.

      2. The status line is located at the bottom left of the browsers screen.
      Move your mouse over a link on a web site and the status line displays
      the URL where that link goes.
      Once again this can be a clue but beware because spoofers can also use a
      JavaScript to insert whatever information they want into the status
      line bar.

      3. Users can glean clues about the URL they are on by viewing the source
      HTML code from the menu bar to look for re-written URL’s. To do so in
      Internet Explorer look at the top tool bar and click on the view option.
      From the view option a list of drop down items will display; choose
      the source option. A notepad pop up will open with the source code for
      the web page. Look within the source code for bogus URL rewrites.
      Note that this is tedious and time consuming task and most users are not
      familiar enough with HTML or JavaScript in order to detect a spoof.

      4. The easiest and most reliable clue to detecting URL spoofing is to
      use the menu bar to view the web page’s Properties. For example in
      Internet Explorer from the top menu choose File and then from the drop
      down options choose Properties. The Address (URL) of the actual page
      will be displayed. If it does not match the URL displayed in the
      address line then the page has been spoofed.

      E-MAIL SPOOFING

      It is easier to determine if an e-mail is a spoof by reviewing the
      message the e-mail contains than by using technical tools. For example
      if an e-mail is from a commercial entity and the message requests that
      you provide your log in ID or your account will be suspended it is
      likely a spoofed e-mail. Reputable commercial entities regularly
      contact their customers by e-mail but they don’t ask for log in ID
      because they already have it.

      Another clue is to highlight a link within the suspect e-mail with
      the mouse cursor and to then look at the status line at the bottom left
      of the screen. If the URL in the status line and the link your mouse is
      highlighting do not match up a spoofer is likely at work. Note that
      because JavaScript can be used to change the status line this method is
      not fool proof. Overall, this is a good technique because a lot of
      spoofers do not bother to use the JavaScript to change the status line.

      Technical tools include the users viewing the source data for an
      e-mail. For example, in Outlook Express the message in question is
      chosen and then by right clicking the mouse the user gets a drop down
      box. From the drop down box choose Properties and the e-mails source
      data will be displayed. Usually spoofers will cover their tracks even
      in the details of the source. Viewing the source is therefore not a
      reliable tool.

      WEB SPOOFING / IP SPOOFING

      Use the clues from the URL and E-mail spoofing sections to look for Web and IP spoofing.


      YouSpoof.info does not endorse spoofing, spamming, phishing,
      pretexting or any illegal activities. The information contained on
      YouSpoof.info is purely for informational purposes and not to be used
      for any illegal activity.

      Please do not SPOOF for illegal purposes and take serious note of the following:
      Legally the Junk Fax Law covers Text to Text messages and fines can top out at $500.00 per spoofed message.

      The CAN-SPAM act covers Internet (web and e-mail based) to Text
      messages and fines can top out at $50,000.00 per spoofed message.

      .INFO SPOOF LINKS
      Detect Spoofed Sites
      Detect Spoofed Emails
      anti: spyware, spam, virus
      TODAY’S SPOOFING FACT
      Theory: Early digital marketing pioneers contend that spam is actually an acronym for Simultaneously Posted Advertising Message.

      may 13th 2011 @5:16pm ( youspoof.info / types of spoofing)

      FIND OUT WITH OUR GUIDE TO DETECTING A SPOOF.
      Types Of Spoofing

      Text/SMS Spoofs are sent by either e-mail or through a web
      site. The sender inputs your number and then inputs the number or name
      they want you to see on the caller ID. They then input their message
      and send.
      See Text/SMS Spoofing for more in depth data.

      Phone Spoofs are sent through a phone or a combination of a
      web site and a phone. Typically either involves a third party company
      that acts as an intermediary. The sender initiates a call by either
      visiting the third party company’s web site or calling their specified
      call in number. The sender then inputs the caller ID information they
      want displayed and they are connected. The third party company does all
      the work and charges by the minute. These third party companies will
      even change the sender’s voice and record the call for the spoofer.
      See Caller ID Spoofing for more in depth data.

      URL Spoofing – When the address (A.K.A., domain name or URL)
      displayed in the address ‘location’ bar at the top of a browser is not
      really the web page being displayed it has been spoofed. For example
      the user may see www.citibank.com in the address location bar but really
      be on the web page www.iamgoingtorobyou.com

      Web Spoofing is when the spoofer puts a computer between the
      internet user’s machine and the entire internet thereby intercepting
      everything the internet user does.

      To accomplish this a spoofer must first somehow get an internet user
      to visit the spoofers ‘trap’ web page. The spoofer could get an
      internet surfer to the ‘trap’ web page through a variety of tricks and
      techniques including but not limited to:

      • a link in a spam e-mail
      • through a hyper-link on a non-trap web page
      • even a link the internet surfer clicks on from a search engine.

      Once the internet surfer visits the spoofers ‘trap’ web page every
      web page that the internet user visits thereafter is served from
      spoofers computer. The internet user sees the actual web pages that
      they are visiting but the spoofer is acting as a malicious intermediary
      ISP, spying on everything the internet user sees and types. This means
      that the spoofer can intercept all of the internet users ID’s and
      passwords, credit card information, and anything else the web surfer
      types in to web pages they visit.

      e-mail Spoofing is when a spoofer falsifies the information
      about whom an e-mail is from. Most spam (unsolicited e-mail) uses
      e-mail spoofing with the primary intent to trick the recipient into
      viewing the e-mail. A good example is the thousands of e-mail claiming
      to be from eBay that are really spam.
      The spammer usually does not spoof to hide their location. In fact the
      spammer will go to much greater lengths to hide their actual location
      using a variety of techniques- so that they can not be found.
      See e-mail Spoofing for more in depth data

      IP Spoofing – (Internet Protocol Spoofing) – Data sent over
      the internet (such as an e-mail) is broken up and sent in small pieces
      of information called packets. These packets once received are
      reassembled by the recipient. Each packet contains information about
      who the packet is from and who the packet is to, among other data.
      Spoofers can falsify who the packet is from to trick the recipient.
      This type of spoofing is often used to gain access to machines which use
      IP authentication to verify identity.
      See IP Spoofing for more in depth data.


      YouSpoof.info does not endorse spoofing, spamming, phishing,
      pretexting or any illegal activities. The information contained on
      YouSpoof.info is purely for informational purposes and not to be used
      for any illegal activity.

      Please do not SPOOF for illegal purposes and take serious note of the following:
      Legally the Junk Fax Law covers Text to Text messages and fines can top out at $500.00 per spoofed message.

      The CAN-SPAM act covers Internet (web and e-mail based) to Text
      messages and fines can top out at $50,000.00 per spoofed message.

      .INFO SPOOF LINKS
      Detect Spoofed Sites
      Detect Spoofed Emails
      anti: spyware, spam, virus
      TODAY’S SPOOFING FACT
      If your cell phone
      voice mail is not “pass protected” a Spoofer can access your Voice mail
      and even change the greeting incoming callers hear.

      May 13th 2011 ( you spoof.info webisite….)

      FIND OUT WITH OUR GUIDE TO DETECTING A SPOOF.
      Spoofing FAQ
      1. What is spoofing?
      Spoofing is the part of
      any form of communication (electronic or physical) whereby the sender
      inserts/attaches false identity contact information to the
      communication.

      Some examples:
      You get a text message from your boss’s cell
      phone reading “Yeah….I’m going to need you to stay late and finish that
      TPS report” You sense a prank because your buddies in the cubical across
      the room are snickering.

      You receive an e-mail from your bank saying that there is a
      problem with your online account and need to verify your account
      information or your account will be suspended. You click on the link at
      the end of the e-mail and get a log in page that looks exactly like
      your banks. If you enter your log in and password, you just gave a
      crook complete access to your bank account.

      2. Who Spoofs and Why?

      Spammers, friends and enemies:

      Spammers often spoof to trick you into viewing an e-mail. They send
      out mass messages with a false identity familiar to a large number of
      people so that some percent of those receiving the message will view the
      message. Once the recipient is tricked and the e-mail is viewed the
      spammer may attempt to sell a product, send a political or religious
      message, try to acquire personal or financial information, or deliver a
      virus as an attachment.

      Spammers spoof to make you think they are someone they are not.
      They typically do this in order to separate you from your money.

      Your friends spoof for fun and pranks. Hopefully, the end result is a good laugh.

      Your enemies spoof for malicious fun and pranks usually resulting in hurt feelings or damaged relationships.

      3. Where would someone send or receive a Spoof?
      • A cell phone (voice or text message)
      • A land line phone
      • An e-mail address
      • A Web site
      • The postal mail
      4. When do you know it is a Spoof?

      It is often impossible
      to know if you have received a spoof. Although to the careful observer
      there are several clues that help to separate a spoof from a legitimate
      communication.
      See our guide to Detecting a Spoof

      5. How do Spoofs work?

      A spoof works differently in each medium as the following shows:

      Text/SMS Spoofs are sent by either e-mail or through a web
      site. The sender inputs your number and then inputs the number or name
      they want you to see on the caller ID. They then input their message
      and send.
      See Text/SMS Spoofing for more in depth data.

      Phone Spoofs are sent through a phone or a combination of a
      web site and a phone. Typically either involves a third party company
      that acts as an intermediary. The sender initiates a call by either
      visiting the third party company’s web site or calling their specified
      call-in number. The sender then inputs the caller ID information they
      want displayed and are connected. The third party company does all the
      work and charges by the minute. These third party companies will even
      change the sender’s voice and record the call for the spoofer.
      See Caller ID Spoofing for more in depth data.

      URL Spoofing is when the address (A.K.A., domain name or URL)
      displayed in the address location bar at the top of a browser is not
      really the web page being. For example the user may see
      www.citibank.com in the address location bar but really be on the web
      page www.iamgoingtorobyou.com
      See URL Spoofing for more in depth data.

      Web Spoofing is when the spoofer puts a computer between the
      internet user’s machine and the entire internet thereby intercepting
      everything the internet user does.

      To accomplish this a spoofer must first somehow get an internet user
      to visit the spoofers trap web page. The spoofer could get an internet
      surfer to the trap web page through a variety of tricks and techniques
      including but not limited to:

      • a link in a spam e-mail
      • hyper-link on a non-trap web page
      • a link the internet surfer clicks on from a search engine.

      Once the internet surfer visits the spoofers trap web page every web
      page that the user visits thereafter is served from the spoofers
      computer. The internet user sees the actual web pages that they are
      visiting but the spoofer is acting as a malicious intermediary ISP,
      spying on everything the internet user sees and types. This means that
      the spoofer can intercept all of the internet users ID’s, passwords,
      credit card information and anything else the web surfer types in to web
      pages they visit.

      Email Spoofing is when a spoofer falsifies the information
      about whom an e-mail is from. Most spam (unsolicited e-mail) uses
      e-mail spoofing with the primary intent to trick the recipient into
      viewing the e-mail. A good example are the thousands of e-mails
      claiming to be from eBay that are really just spam.
      See email Spoofing for more in depth data.

      IP Spoofing (Internet Protocol Spoofing) is data sent over the
      internet (such as an e-mail) broken up and sent in small pieces of
      information called packets. These packets, once received, are
      reassembled by the recipient. Each packet contains information about
      who the packet is from and who the packet is to and other data.
      Spoofers can falsify who the packet is from to trick the recipient.
      This type of spoofing is often used to gain access to machines which use
      IP authentication to verify identity.
      See IP Spoofing for more in depth data.

      6. What do I do if I have received a spoof?

      If you’ve been
      victimized by a spoofed e-mail or web site you should contact your local
      police or sheriff’s departments and file a complaint with the FBI’s
      Internet Crime Complaint Center at www.ic3.gov.

      .INFO SPOOF LINKS
      Detect Spoofed Sites
      Detect Spoofed Emails
      anti: spyware, spam, virus
      TODAY’S SPOOFING FACT
      Telephone access
      to accounts using caller ID to verify the users identity are an easy
      targets for Spoofers. Make sure all your accounts are security pass
      code protected.

      May 13th 2011 @3:26pm ( contact sheriff/police on information of voice changing solftware..)

      So i tried to call the sheriff/police station form my magic jack… the funny thing is that it  did not go though for the regular  number…it did however go though on an additional number that information gave me . 
      so this is how it went ….

      i called in and spoke with the woman who answers the phone… she didn’t  say her name or that the line was recorded or give a badge number.. but when I questioned it .. because every other time i have called i usually have a person who answers the phone say who they are … where i am calling… ( ie department ) and that the  phone line was recorded.. and what their badge number is.

      i tried to explain what  i was calling about and requested officer linquist( who i had just  talked with… and she suggested instead i speak with  someone form the “it” department so she put me though to officer rodriquez ( it was a woman and i was wondering if it was the same woman who sent me  a reply  email when i had questions concerning my driver’s license  being  swiped  at  a guard gate.  

       ms. Rodriquez then put me in touch with sonda moore at the help desk and i was given a number for don or john kilpatric. ( 793-9117) who is in charge of computer forensic department  where no one  answered so i called back and got  in touch with deputy finney the communnication supervisor… ( 252-9300 extension 3300)

      As of this moment i still have a lot of questions concerning  how to prevent/stop anyone from using a  computer software program  and being able to  change their voice on the  phone…   and as of today… i am wondering why some phone numbers  are having problems going through… i also called the Naples bay resort the phone number listed on the website will not work on my magic jack number. HUMMMMMMM

      May 13th 2011 @ 3:03pm ( tried to call for additional patrol but magic jack wouldn’t call the sheriff telephone. strange right? )

      so as a precaution… and deterrent to make sure that there will be no one able to break into my home… i tried to call  the police/sheriff department to request an additional drive by  and told them that if anyone was in  my home to  please arrest them as they will not only be trespassing but also breaking and entering…  telephone number of: 239- 774-4434…. i dialed the telephone number it has two busy tones and then hangs up by itself… very strange.. You would think that having any criminal activity.. or needing a phone for an emergency… that the one phone number you should always be able to access… is the POLICE or FIRE Or SHERIFF   and any emergency numbers.. along with  dispatch for them…  and offices for them…. especially in the middle of a work day.. of a work week… This phone situation ….i don’t even know what to say about  it…  but i wanted to document it in my blog so that i will have record of me not only trying to protect myself.. my home and my possessions but the interference in pursuing that goal…   when i called the number that the information form magic jack gave me i received a telephone number of 239-597-1607 and was able to  speak with officer Linquest..badge number# 3141. ( he had actually been to my home   before…. so i left hm a message and told him i will follow through with a written request through their   website  he said he will also leave an email message and that i should also try to call again before babysitting.  and request  again…  i know when i met a police officer at the Mobil gas station he was also extremely helpful in helping me put in a request for additional patrols. 

      I really appreciate  all the police and sheriff department   have tried to do on my behalf to prevent anyone from entering my home when i am not here.( which is considered breaking and entering… . and from harming not only my life but also protecting my possessions from any further damage…. I also want to thank  the neighbors who keep an eye on my place when i leave to make sure that no one breaks in when i go out to work .

      May 12th 2011 @12:05am ( a “how to” site on changing your voice during a call )ru coi


      How to Change Your Voice During a Call

      updated: November 16, 2010

      Being able to change one’s
      voice is an interesting concept that can be applied in many ways to
      personal phone calls, such as playing tricks on friends or sounding much
      older or younger than you normally would. With a microphone,
      voice-changing software and VoIP (Voice Over Internet Protocol) software for the computer, it’s simple to change one’s voice so that the person on the other line hears a voice that’s not your own.

      Difficulty:
      Moderately Easy

      Instructions

      1. Voice-changing Software

        • 1

          Download voice-changing software to your computer (see Resources).

        • 2

          Install the voice-changing software to your computer by following the onscreen steps provided with the installation program.

        • 3

          Run the voice-changing software by double-clicking on the newly created shortcut icon on the desktop.

        • 4

          Configure the program to work
          with your microphone by selecting the “In” option to your built-in or
          external microphone. In most cases it will already be selected.

        • 5

          Read the instructions or help
          file that came with the program. All voice-changing programs are
          different but have the same basic controls and, by reading this, you
          will familiarize yourself with the program.

        Calling Someone

        • 1

          Download and install VoIP software if you do not already have this software (see Resources).

        • 2

          Use the VoIP software to call someone by entering the recipient’s user name or phone number, depending on the program.

        • 3

          Speak into the microphone.
          Depending on the voice-changing program you may or may not hear your own
          voice, but the person you’re calling will hear the changed voice on the
          receiving end.

        • 4

          Change options with the
          voice-changing software to your liking by either moving the pitch up or
          down or using preset effects. There often will be an option to hear
          yourself talk so you can change your voice in real time and hear what it
          sounds like.

      • www.voiceshot.com”“>www.voiceshot.com””=””>www.voiceshot.com” class=”title”>IVRwww.voiceshot.com”“>www.voiceshot.com””=””>www.voiceshot.com” class=”baseurl url”>www.voiceshot.com

        Automate IVR phone calls with XML. Inbound & outbound. Try it now free

      • www.SkillSoft.com”“>www.skillsoft.com””=””>www.SkillSoft.com” class=”title”>Computer Online Trainingwww.SkillSoft.com”“>www.skillsoft.com””=””>www.SkillSoft.com” class=”baseurl url”>www.SkillSoft.com

        Training available online anytime. Read “Getting Started” whitepaper.

      • www.visionsfreelancedesign.com”“>www.visionsfreelancedesign.com””=””>www.visionsfreelancedesign.com” class=”title”>Freelance Graphic Designwww.visionsfreelancedesign.com”“>www.visionsfreelancedesign.com””=””>www.visionsfreelancedesign.com” class=”baseurl url”>www.visionsfreelancedesign.com

        Professional, Affordable & Custom Creatively Designing Your Visions.

      • Top 10 Predictive DialersBusiness-Software.com/DialerSoft

        2011 Top Predictive Dialer Software Free Buyer’s Guide – Download Now.

      Ads by Google

      Resources

      Comments

        Helpful?
        Yes
        No