Berkeley CSUA MOTD:Entry 42587
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/05/24 [General] UID:1000 Activity:popular
5/24    

2006/3/31-4/3 [Computer/Networking] UID:42587 Activity:nil
3/31    Geek discovers partner of 17 years was cheating on him, by
        reconfiguring his network so everything (including wireless) would
        route through an 8-port switch and putting a notebook with Ethereal
        in the network closet on the switch
        http://www.lenholgate.com/archives/000638.html
        "Right now I still find it quite difficult to concentrate enough to
        get any technical work done ..."
        \_ "Stay away from blondes, as they drop their skirts for anything,
           man, woman, or german shepherd." hahahaha
        \_ If he had just put a little effort into planning
           his network topology he would have caught her months ago.
        \_ We care why?
2025/05/24 [General] UID:1000 Activity:popular
5/24    

You may also be interested in these entries...
2012/3/29-6/4 [Computer/HW/Memory, Computer/HW/CPU, Computer/HW/Drives] UID:54351 Activity:nil
3/29    A friend wants a PC (no mac). She doesn't want Dell. Is there a
        good place that can custom build for you (SSD, large RAM, cheap video
        card--no game)?
        \_ As a side note: back in my Cal days more than two decades ago when
           having a 387SX made me the only person with floating-point hardware,
           most machines were custom built.
	...
2012/4/26-6/4 [Computer/Networking] UID:54371 Activity:nil
4/26    I see that soda has an ipv6 address but ipv6 traffic from this box
        doesn't actually work (ping6 <DEAD>ipv6.google.com<DEAD>, ping6 http://www.v6.facebook.com
        Is this expected to work?
        \_ Soda doesn't have a real IPv6 address.  The IPv6 addresses you see
           in ifconfig are just link-local addresses; any IPv6-capable machine
           will autogenerate these, whether or not it's connected to an IPv6
	...
2012/1/19-3/3 [Computer/Networking, Politics/Foreign/Europe, Computer/SW] UID:54294 Activity:nil
1/19    Transcript between the Italian cruise ship captain and the Port
        Authority
        http://www.csua.org/u/v9i (abcnews.go.com)
        This captain is amazing.
	...
2011/12/29-2012/2/6 [Computer/Networking, Computer/SW/Security] UID:54277 Activity:nil
12/29   New brute force attack against WPA1/2 base stations based on a flaw
        in WiFi Protected Setup (WPS):
        http://www.kb.cert.org/vuls/id/723755
        http://www.tacnetsol.com/products
        http://sviehb.wordpress.com/2011/12/27/wi-fi-protected-setup-pin-brute-force-vulnerability
	...
2011/11/8-30 [Computer/SW/Security, Computer/SW/OS/Windows] UID:54218 Activity:nil
11/8    ObM$Sucks
        http://technet.microsoft.com/en-us/security/bulletin/ms11-083
        \_ How is this different from the hundreds of other M$ security
           vulnerabilities that people have been finding?
           \_ "The vulnerability could allow remote code execution if an
               attacker sends a continuous flow of specially crafted UDP
	...
2010/11/1-2011/1/13 [Computer/Networking] UID:54002 Activity:nil
11/1    I'm moving from a home in Fremont to another home within the same ZIP
        code in Fremont, and AT&T customer service says I cannot transfer my
        DSL service because DSL is not available at my new home.  Is that BS?
        Are they just trying to push me to subscribe to their more expensive
        U-verse service?  I'm not asking for any lightening-speed connection.
            \_ could be
	...
2010/7/24-8/25 [Computer/Networking] UID:53896 Activity:nil
7/23    Internet's first router:
        http://www.wimp.com/firstrouter
        \_ Wow!  And the first VoIP phone!  Notice that the fans on that
           hardware look just like the fans these days.
           \_ I'm typing on an IBM Clicky Clacky Keyboard.
	...
Cache (8192 bytes)
www.lenholgate.com/archives/000638.html
t=ramcom-21&o=2&p=8&l=as1&asins=19 32266828&fc1=000000&IS2=1&lt1=_blank&lc1=0000ff&bc1=000000&bg1=ffffff& f=ifr Sorry about the lack of technical postings for a while, this last month or so has been rather hard for me. On 13th February I became suspicious that something wasn't quite right with Michelle, my partner for the last 17 or so years. I then connected to the laptop via a Remote Desktop Connection and controlled the sniffer from my main PC. if you plan to use technology when cheating it's probably best to understand the technology involved better than the person that you're cheating on... Geek note: setting up the sniffer was actually considerably harder than I expected; being able to monitor the network had never been a design constraint on the original installation or the subsequent equipment upgrades. I currently use a combined ADSL modem, router and WIFI access point and it proved impossible to sniff the WIFI network segment from the wired network and equally impossible to sniff the WIFI via the WIFI on my laptop. What's more the fact that I'd replaced my hubs with switches would also have caused me problems... In the end I pulled out my "old hardware" box and connected up my old ADSL modem to the incoming line, put an old 8 port hub between that and the combined router and WIFI box and turned off the ADSL modem in the combined box. All network traffic was now routed across the hub to the old ADSL modem. Plugging my laptop into the hub gave me the logging capabilities that I required... t=ramcom-21&o=2&p=8&l=as1&asins=15 97490202&fc1=000000&IS2=1&lt1=_blank&lc1=0000ff&bc1=000000&bg1=ffffff& f=ifr But I digress; the sniffer provided me with evidence that Michelle had been having an affair since mid January. During the trip I decided that the relationship couldn't continue and so on our return she moved out. Since I don't hate her, I figure that nobody else is allowed to... Right now I still find it quite difficult to concentrate enough to get any technical work done. I expect technical postings will resume once I get my head sorted out. This morning has been the first time since we returned from Colorado that I've been able to sit down and code... Athenian at March 28, 2006 06:26 AM ah i remember making such a discovery but more low tech. while doing the fun thing i noticed a strange spot on her back. but her first story was a long one about it being caused from gouging her back while reaching for the iron. showing me how she reached up for the iron in the closet resulting in coming down against a closet door handle which gouged her back. Bart at March 28, 2006 06:36 AM The very first commercial software product I ever wrote was a keystroke logger for the Mac called Last Resort. It was published by Working Software, which is no longer in business. Unlike today's keystroke loggers which focus on capturing passwords and credit card numbers, my product was marketed for the purpose of capturing text lost due to power failures and crashes, even if it had never been saved. I made some effort to make Last Resort's presence obvious to the user, lest it be planted on their Mac, and it could be disabled to allow safe password entry. But all my efforts didn't help David Pogue's girlfriend. David Pogue was at the time an editor for Mac User magazine. At a MacWorld Expo he ran up to me and said how grateful he was that I wrote Last Resort, as he had used it to catch his girlfriend writing love letters to the man she was having an affair with. He broke up with her, and told me he was very happy I had enabled him to find out. I would have thought a more natural response would be for him to curse my name. But no, he was indeed happy, and to show just how happy he was with my product, he used it (under a fake, but obvious name) in a novel he wrote about the software industry, in which Last Resort saves the world because it captures an important, secret password. com/ I do want to say, having sufferred my own share of heartbreak, that I sympathize with your loss. Michael Crawford at March 28, 2006 06:40 AM There's an old saying, "easy" come, "easy" go. If you have a hard time getting her, just imagine how hard it would be for another to. Stay away from blondes, as they drop their skirts for anything, man, woman, or german shepherd. James Hughes at March 28, 2006 06:45 AM What you did is illegal and immoral. Plus the method you used, is so bloated and exxagerated. Could have been done with two 20k apps paired right on the target machine that you had access to. jonah at March 28, 2006 06:48 AM Hi man, I just ended my relationship with my fiancee for different reasons, but I highly respect your choice. It takes a lot of courage to move on and make the most honest choice for yourself. Faraway at March 28, 2006 06:50 AM "Everything happens for a reason" is pretty much the rule that I live my life by. Sometimes it does take a while to work out what the reason is though... When most things actually happen I seem to have already been through a worse outcome in my head at some prior point and having already faced up to the possibilities it seems easier to face the reality. Having said that I'd never done "contingency planning" for this particular situation, it came completely out of the blue, but my "what if she dies in a car crash, how could I cope alone" planning can be put into service... Len at March 28, 2006 06:51 AM heh, dude - what were you doing with her after 17 years? She prob got bored and decided she wanted a man of action instead of a man of words. Sorry to hear about it, dude, but honestly if you spent as much effort on the relationship as spying on your own local network, she prob wouldn't have drifted away. And by work I don't mean "telling her how you feel" all the time. heh at March 28, 2006 06:52 AM Jonah Illegal and immoral? Given I had a limited amount of time to work with the target machine and I had no previous experience in monitoring a machine in a way that wasn't detectable and given that my priority was to gather as much information as possible over an unknown period of time I figure that monitoring the network was the safest and least disruptive option available to me. It will take a couple months to feel and work through the emotions. Posted by: at March 28, 2006 06:59 AM Holy fricksticks, chum. Can't understand why you couldn't capture packets from one wi-fi laptop to another, though? Surely if one was in promiscuous receive mode all should work? Hector Torvisque at March 28, 2006 07:00 AM "What you did is illegal and immoral." Posted by: at March 28, 2006 07:02 AM Hector I didn't spend much time trying to work out the wifi capture problem as I had limited time alone to make the changes. I knew I had the hardware I needed to change the configuration and get everything. Len at March 28, 2006 07:03 AM you're a bit of a loser if you have to *snoop* on your "girlfriend". You might have just realised that if there was no trust, it was over already. However, I was snooping so that I had solid evidence (rather than purely circumstantial stuff) for when I confronted her. Perhaps living with a litigation lawyer for 17 years has rubbed off... do it on your own computer at your own house on your own damn paid for line. Posted by: J at March 28, 2006 07:30 AM I caught my ex the same way more or a less, but by accident. I had been legitimately using a packetsniffer to monitor network traffic coming from a game that we were both playing at the time (everquest) and I noticed a big spike in aim traffic when I wasn't home at a certain time every day... The first line I got was "God I wish you were here right now so I could be f***ing you." Foolishly, I took her back after that breakup and wasted another couple years of my life. Shad at March 28, 2006 07:30 AM Oh man, you should have called the guys from the show Cheaters... Well, at least you can now call them to start a new show: Cheaters Tech Edition, where they use CSI equipment to discover the unfaithfuls. Felipe at March 28, 2006 07:32 AM Len, Hell i feel for you! It is natural to think back on the good times so don't berate yourself for it. And keep your composure, do not reply to ...