<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: UK File-Sharers and the &#8220;Wireless Defense&#8221;</title>
	<atom:link href="http://torrentfreak.com/uk-file-sharers-and-the-wireless-defense-080717/feed/" rel="self" type="application/rss+xml" />
	<link>http://torrentfreak.com/uk-file-sharers-and-the-wireless-defense-080717/</link>
	<description>Breaking File-sharing, Copyright and Privacy News</description>
	<lastBuildDate>Tue, 28 Oct 2014 15:45:42 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.2</generator>
	<item>
		<title>By: Virgin Media Router</title>
		<link>/uk-file-sharers-and-the-wireless-defense-080717/#comment-472675</link>
		<dc:creator><![CDATA[Virgin Media Router]]></dc:creator>
		<pubDate>Sat, 02 Aug 2008 10:04:25 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=2978#comment-472675</guid>
		<description><![CDATA[What about cloning of virgin media routers? 

see http://cgi.ebay.co.uk/Motorola-Surfboard-SB5100-LATEST-SIGMA-FLASHED_W0QQitemZ170245752168QQcmdZViewItem?hash=item170245752168&amp;_trkparms=72%3A12&#124;39%3A1&#124;66%3A2&#124;65%3A12&amp;_trksid=p3286.c0.m14.l1318

or tcniso

All the hacker needs is to find your routers MAC address and they&#039;re effectively &#039;riding&#039; on your connection. The IP address would link to YOUR account. Virgin Media has virtually no way to fight this.

They don&#039;t need to be next door, they can be anywhere with a cable connection.

How&#039;s that for a defense?]]></description>
		<content:encoded><![CDATA[<p>What about cloning of virgin media routers? </p>
<p>see <a href="http://cgi.ebay.co.uk/Motorola-Surfboard-SB5100-LATEST-SIGMA-FLASHED_W0QQitemZ170245752168QQcmdZViewItem?hash=item170245752168&#038;_trkparms=72%3A12" rel="nofollow">http://cgi.ebay.co.uk/Motorola-Surfboard-SB5100-LATEST-SIGMA-FLASHED_W0QQitemZ170245752168QQcmdZViewItem?hash=item170245752168&#038;_trkparms=72%3A12</a>|39%3A1|66%3A2|65%3A12&amp;_trksid=p3286.c0.m14.l1318</p>
<p>or tcniso</p>
<p>All the hacker needs is to find your routers MAC address and they&#8217;re effectively &#8216;riding&#8217; on your connection. The IP address would link to YOUR account. Virgin Media has virtually no way to fight this.</p>
<p>They don&#8217;t need to be next door, they can be anywhere with a cable connection.</p>
<p>How&#8217;s that for a defense?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Jadedan</title>
		<link>/uk-file-sharers-and-the-wireless-defense-080717/#comment-463145</link>
		<dc:creator><![CDATA[Jadedan]]></dc:creator>
		<pubDate>Thu, 24 Jul 2008 07:47:42 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=2978#comment-463145</guid>
		<description><![CDATA[As the legal issues surrounding file-sharing heat up in the UK, more and more recipients of compensation demands are considering their defense. One such possibility is the &#039;wireless&#039; or &#039;WiFi&#039; defense. We take a look at the issue and try to shine some light on what people can expect, should they take this route.]]></description>
		<content:encoded><![CDATA[<p>As the legal issues surrounding file-sharing heat up in the UK, more and more recipients of compensation demands are considering their defense. One such possibility is the &#8216;wireless&#8217; or &#8216;WiFi&#8217; defense. We take a look at the issue and try to shine some light on what people can expect, should they take this route.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: XAVeRY</title>
		<link>/uk-file-sharers-and-the-wireless-defense-080717/#comment-458399</link>
		<dc:creator><![CDATA[XAVeRY]]></dc:creator>
		<pubDate>Sat, 19 Jul 2008 18:21:18 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=2978#comment-458399</guid>
		<description><![CDATA[With WPA2, as well as WPA, the strength of the encryption is based on how strong the key is. If you&#039;re going to use short passwords commonly found in wordlists, then you&#039;re just as secured as when you&#039;re using no security. And don&#039;t even get me started on WEP, which can be cracked much more easier than WPA(2). I can assure you that if you&#039;re going to use a WPA(2) passphrase coming from a random symbol generator (such as the one found on http://www.kurtm.net/wpa-pskgen/ or just /dev/urandom on Unixes), you won&#039;t get unknown people strolling around your network.

About the logs from the routers : most routers don&#039;t even write logs, and if they do, they&#039;re just stored in the RAM and therefore lost whenever the device reboots.]]></description>
		<content:encoded><![CDATA[<p>With WPA2, as well as WPA, the strength of the encryption is based on how strong the key is. If you&#8217;re going to use short passwords commonly found in wordlists, then you&#8217;re just as secured as when you&#8217;re using no security. And don&#8217;t even get me started on WEP, which can be cracked much more easier than WPA(2). I can assure you that if you&#8217;re going to use a WPA(2) passphrase coming from a random symbol generator (such as the one found on <a href="http://www.kurtm.net/wpa-pskgen/" rel="nofollow">http://www.kurtm.net/wpa-pskgen/</a> or just /dev/urandom on Unixes), you won&#8217;t get unknown people strolling around your network.</p>
<p>About the logs from the routers : most routers don&#8217;t even write logs, and if they do, they&#8217;re just stored in the RAM and therefore lost whenever the device reboots.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: h33t</title>
		<link>/uk-file-sharers-and-the-wireless-defense-080717/#comment-457969</link>
		<dc:creator><![CDATA[h33t]]></dc:creator>
		<pubDate>Sat, 19 Jul 2008 04:42:32 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=2978#comment-457969</guid>
		<description><![CDATA[good article

the number 1 strategy against filesharers is bullying

bullying is illegal at school, work, on the street, in hospital, at church, but the media cartels prefer it above all

http://www.h33t.com]]></description>
		<content:encoded><![CDATA[<p>good article</p>
<p>the number 1 strategy against filesharers is bullying</p>
<p>bullying is illegal at school, work, on the street, in hospital, at church, but the media cartels prefer it above all</p>
<p><a href="http://www.h33t.com" rel="nofollow">http://www.h33t.com</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Crusher Destroyer</title>
		<link>/uk-file-sharers-and-the-wireless-defense-080717/#comment-457306</link>
		<dc:creator><![CDATA[Crusher Destroyer]]></dc:creator>
		<pubDate>Fri, 18 Jul 2008 08:10:52 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=2978#comment-457306</guid>
		<description><![CDATA[I&#039;m an American living in Japan at the moment. I am DL the shit outta Waffles, Demonoid, and TPB. I am not worried as I don&#039;t think that any of these agencies could communicate with my Japanese ISP.

Maybe, but..

What do ya&#039;ll think?]]></description>
		<content:encoded><![CDATA[<p>I&#8217;m an American living in Japan at the moment. I am DL the shit outta Waffles, Demonoid, and TPB. I am not worried as I don&#8217;t think that any of these agencies could communicate with my Japanese ISP.</p>
<p>Maybe, but..</p>
<p>What do ya&#8217;ll think?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Technocat</title>
		<link>/uk-file-sharers-and-the-wireless-defense-080717/#comment-457252</link>
		<dc:creator><![CDATA[Technocat]]></dc:creator>
		<pubDate>Fri, 18 Jul 2008 07:07:06 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=2978#comment-457252</guid>
		<description><![CDATA[@21
There&#039;s an even easier way in linux, just use:

# macchanger -r eth1

for a completely random address every time.]]></description>
		<content:encoded><![CDATA[<p>@21<br />
There&#8217;s an even easier way in linux, just use:</p>
<p># macchanger -r eth1</p>
<p>for a completely random address every time.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Welshie</title>
		<link>/uk-file-sharers-and-the-wireless-defense-080717/#comment-457100</link>
		<dc:creator><![CDATA[Welshie]]></dc:creator>
		<pubDate>Fri, 18 Jul 2008 02:55:23 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=2978#comment-457100</guid>
		<description><![CDATA[&#039;When I first installed and tested the wifi, it ran really fast, but when I setup the recommended (not REQUIRED) level of security passwords, it slowed right down. So to get the speed I payed for, your honour, I had to...&#039;]]></description>
		<content:encoded><![CDATA[<p>&#8216;When I first installed and tested the wifi, it ran really fast, but when I setup the recommended (not REQUIRED) level of security passwords, it slowed right down. So to get the speed I payed for, your honour, I had to&#8230;&#8217;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Izkata</title>
		<link>/uk-file-sharers-and-the-wireless-defense-080717/#comment-457035</link>
		<dc:creator><![CDATA[Izkata]]></dc:creator>
		<pubDate>Fri, 18 Jul 2008 00:50:51 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=2978#comment-457035</guid>
		<description><![CDATA[So, multiple MAC addresses in the logs makes it less likely that they&#039;ll believe you did it?

for linux:
sudo ifconfig eth1 down hw ether 01:01:A0:A0:FF:FF
sudo ifconfig eth1 up

Yay, new MAC address!]]></description>
		<content:encoded><![CDATA[<p>So, multiple MAC addresses in the logs makes it less likely that they&#8217;ll believe you did it?</p>
<p>for linux:<br />
sudo ifconfig eth1 down hw ether 01:01:A0:A0:FF:FF<br />
sudo ifconfig eth1 up</p>
<p>Yay, new MAC address!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: 10 is a moron</title>
		<link>/uk-file-sharers-and-the-wireless-defense-080717/#comment-457026</link>
		<dc:creator><![CDATA[10 is a moron]]></dc:creator>
		<pubDate>Fri, 18 Jul 2008 00:25:21 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=2978#comment-457026</guid>
		<description><![CDATA[@10
Just read that article.
It references the laser printer.
That&#039;s it.
Everything else is completely different from this article.
Not a SINGLE sentence was copypasta.
Conclusion-
You&#039;re a moron.]]></description>
		<content:encoded><![CDATA[<p>@10<br />
Just read that article.<br />
It references the laser printer.<br />
That&#8217;s it.<br />
Everything else is completely different from this article.<br />
Not a SINGLE sentence was copypasta.<br />
Conclusion-<br />
You&#8217;re a moron.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: oneplusone</title>
		<link>/uk-file-sharers-and-the-wireless-defense-080717/#comment-457009</link>
		<dc:creator><![CDATA[oneplusone]]></dc:creator>
		<pubDate>Fri, 18 Jul 2008 00:04:08 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=2978#comment-457009</guid>
		<description><![CDATA[@ #6... Then you&#039;re not going to be mounting a robust wi-fi defense anytime soon? Cause you&#039;re convinced yer WPA2&#039;s a +20 Wizard with Balls of Fire? 
Then you wouldn&#039;t be interested in this information: &quot;-=Xploitz=- VIDEO: Volume #3 &quot;E-Z WPA/WPA2 Cracking Tutorial ...&quot; 

Secure wireless is hilarious, even as science fiction. Flash, look out!]]></description>
		<content:encoded><![CDATA[<p>@ #6&#8230; Then you&#8217;re not going to be mounting a robust wi-fi defense anytime soon? Cause you&#8217;re convinced yer WPA2&#8242;s a +20 Wizard with Balls of Fire?<br />
Then you wouldn&#8217;t be interested in this information: &#8220;-=Xploitz=- VIDEO: Volume #3 &#8220;E-Z WPA/WPA2 Cracking Tutorial &#8230;&#8221; </p>
<p>Secure wireless is hilarious, even as science fiction. Flash, look out!</p>
]]></content:encoded>
	</item>
</channel>
</rss>
