Page 3 of 3 FirstFirst 123
Results 21 to 27 of 27

Thread: University LAN, I dont want to log in!

  1. #21
    Senior Member
    Join Date
    Mar 2004
    Posts
    510
    I wouldn't constitute my actions as breaking into the schools network.
    Just because you don't think it's wrong isn't going to help you in the long run.

    Try accessing an ATM with a card and pin you made yourself and see how you make out explaining it to the bank. Don't forget to tell them you are just doing it to learn.
    \"You got a mouth like an outboard motor..all the time putt putt putt\" - Foghorn Leghorn

  2. #22
    Senior Member
    Join Date
    Jul 2004
    Posts
    131
    Originally posted here by whatthe
    Just because you don't think it's wrong isn't going to help you in the long run.

    Try accessing an ATM with a card and pin you made yourself and see how you make out explaining it to the bank. Don't forget to tell them you are just doing it to learn.
    The problem we have (I think this is in Info Sec. as a whole!) is that people still don't take this stuff seriously enough. I am not saying this is across the board. Banks, Governments e.t.c. are taking information security seriously - but other people and areas are not!

    I completely agree with your reply - but i did not take that tone with the original poster because I do believe that this fellow really does believe that he is doing *nothing* wrong. And I see this all the time in the workplace and in private life.

    I think the original poster does believe that there is a **HUGE** difference between trying to experiment/learn/break into a bank ATM machine and trying to experiment/learn/break into a university LAN are completely different things and should no be punished in the same way.

    Unfortunately I have no good answer or good solution to this line of thinking. Perhaps it's because the personal computer is used for so many other things today other than *serious* stuff (mp3's, games, videos, porno) - people forget that there is real important confidential data (medical info, financial info, personal info, credit card info, ) in computers/networks and accessing it without authorization is a criminal offense that can lead to nasty consequences.

    A lot also depends upon whom you run into. For instance, a CSO at a hospital would have you and your entire family burnt at the stake. A sys. admin at a university might not do much. Who knows. It all really depends.
    More cowbell! We need more cowbell!
    http://www.geocities.com/secure_lockdown/
    - - -
    \"Is the firewall there to protect you from the outside world or is it there to protect the outside world from *YOU*?\"

  3. #23
    Senior Member br_fusion's Avatar
    Join Date
    Apr 2002
    Posts
    167
    First off, I think you guys are lying if you tell me you have never crossed the line (even if it was just for one minute of your life) in order to find something out or to learn something new.

    As far as me not realizing that what I'm doing is wrong, I really wish some of you would read my posts closer:

    "So yet what I'm doing may be some wrong doing.."
    "I'll continue to outweigh the risk ..."

    I know what I'm getting into, and the mentalities of most system admins are very dangerous these days. This is what I keep in mind. This is what XTC46 also pointed out to me. (also sorry XTC46 if I seemed to get defensive after your 1st post, and I appreciate your kind response afterwards.)

    I appreciate everyone’s concern for my actions (or rants). I will continue to learn as much as I can without crossing this line. But it’s when users (actually user) quote me as "playing" and using "hacking tools", this is what worries me. I just want advice, leave the rest. (Maybe too much SNL and listening to don’t fear the reaper….)

    Ok, this could go on forever, my questions have been answered, let’s let my post die, shall we?

    Cheers and peace

    Fusion


    Also, thanks for the idea utahlanman.
    The command completed successfully.


    \"They drew first blood not me.\"

  4. #24
    Senior Member
    Join Date
    Jul 2004
    Posts
    131
    sorry - normally, when someone is very interested in *hiding* their tracks - we usually assume they are up to no good.

    good luck.. and remember: don't do unto others what you don't want done to you .. ;-)
    More cowbell! We need more cowbell!
    http://www.geocities.com/secure_lockdown/
    - - -
    \"Is the firewall there to protect you from the outside world or is it there to protect the outside world from *YOU*?\"

  5. #25
    Senior Member br_fusion's Avatar
    Join Date
    Apr 2002
    Posts
    167
    When will you learn, I told you to read a little closer before posting.

    "Before I continue, I found out that this isn't used to log and track students, it is just to insure that the public can not use(steal) the University's internet. "

    Nice try though.


    Fusion
    The command completed successfully.


    \"They drew first blood not me.\"

  6. #26
    Regal Making Handler
    Join Date
    Jun 2002
    Posts
    1,668
    When will you learn, I told you to read a little closer before posting
    It's all academic, I doubt you will finnish your course.
    What happens if a big asteroid hits the Earth? Judging from realistic simulations involving a sledge hammer and a common laboratory frog, we can assume it will be pretty bad. - Dave Barry

  7. #27
    Senior Member
    Join Date
    May 2003
    Posts
    1,199
    None of us said we have never crossed that line, and none of us said we were right for doing it. Im just letting you know that sometimes it is not worth the risk, and some times people dont really know the risks. I was just trying to let you know that this type of thing is no longer punished with a slap on the wrist. If you feel it is worth the risk then continue doing it your way, and I wish you the best of luck.

    Before I continue, I found out that this isn't used to log and track students, it is just to insure that the public can not use(steal) the University's internet. "
    you're kidding right? That specific portion may be used for auth only but im sure they are keeping track of every single person who logs onto their network.
    Everyone is going to die, I am just as good of a reason as any.

    http://think-smarter.blogspot.com

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •