Step One: Post detailed logs, screenshots, and examples of stolen files in your web log:
"I discovered an open AP near work, I was able to guess their administrator password. I was most interested in a backed up Outlook database floating around in an "admin files" folder. Once home, I opened the .pst file with Outlook. Since it didn't take me long to rob those files, I thought I would take a quick run through some condos closer to home." - http://rayhaque.blogspot.com/
"I found another AP on the same street. The system was wide open. He was running 2 PC's one was XP the other Linux RedHat. The RedHat box was secure, however, the XP box was wide open with 100's of shares." - http://www.spacemonkey-studio.com/wardriving.asp
I know these are thebroken idiots, but someone should either tell them that writing down your crimes is a bad idea, or just turn them into the police and get two more morons off the street.
"I discovered an open AP near work, I was able to guess their administrator password. I was most interested in a backed up Outlook database floating around in an "admin files" folder. Once home, I opened the .pst file with Outlook. Since it didn't take me long to rob those files, I thought I would take a quick run through some condos closer to home." - http://rayhaque.blogspot.com/
"I found another AP on the same street. The system was wide open. He was running 2 PC's one was XP the other Linux RedHat. The RedHat box was secure, however, the XP box was wide open with 100's of shares." - http://www.spacemonkey-studio.com/wardriving.asp
I know these are thebroken idiots, but someone should either tell them that writing down your crimes is a bad idea, or just turn them into the police and get two more morons off the street.
Comment