New device helps find free WiFi signal while traveling +

Most of us are not "computer people" so post your technical questions and comments here. If you have computer or Internet expertise, share it here.

Moderators: carlson1, Keith B

Post Reply
User avatar

Topic author
HighVelocity
Senior Member
Posts in topic: 3
Posts: 3374
Joined: Thu Feb 10, 2005 7:54 pm
Location: DFW, TX
Contact:

New device helps find free WiFi signal while traveling +

#1

Post by HighVelocity » Wed May 10, 2006 12:13 pm

Not only can I see half a dozen Wifi signals but I can see which ones are free AND connect.

For those of us that travel for business it can be a real hassle to get a wireless signal for our laptop. Even if we find one, half the time we can't connect and the other half it's $10 or more even though we only need it for 5 minutes. :roll:

Based on a friends recommendation, I purchased this device:
http://www.ecost.com/ecost/ecsplash/sho ... 570009.asp

The Hawking Tech Wifi locater/directional amplified antenna is worth it's weight in gold.
Right now I am connected to a free signal that I couldn't even see with my computers built in WiFi antenna.
If you can't find a signal, point it in a different direction. I've been using it for two weeks and it's worked like a charm every time. ;-)

edit: I am not suggesting nor encouraging anyone to connect to UNSECURED PRIVATE networks. This only allows one to connect to FREE PUBLIC networks that would otherwise be out of range.
Last edited by HighVelocity on Wed May 10, 2006 1:56 pm, edited 1 time in total.

User avatar

rgoldy
Member
Posts in topic: 2
Posts: 167
Joined: Thu Dec 23, 2004 5:49 pm
Location: Sugar Land TX

#2

Post by rgoldy » Wed May 10, 2006 1:43 pm

I am afraid that I have to respectfully disagree with you. Using someone elses WiFi hookup without permission is stealing. Even if the owner is so foolish as to allow open access to the link, I think that unless you have permission to do so, it is wrong.
Just my opinion you understand.
Lead, follow, or get out of the way.
JOIN NRA[/i] JOIN TSRA

User avatar

Topic author
HighVelocity
Senior Member
Posts in topic: 3
Posts: 3374
Joined: Thu Feb 10, 2005 7:54 pm
Location: DFW, TX
Contact:

#3

Post by HighVelocity » Wed May 10, 2006 1:53 pm

Ok, I see how what I've stated above could be taken as stealing. Let me clarify.

There are a lot of FREE Wifi signals out there and I do not mean unsecured private networks.

For example. The hotel I am in right now has free service in the Lobby and free service in the guest rooms. To get service in the ballroom area though you have to pay.
This device allows me to pickup the signal from the Lobby even though I am out of range if only using my laptops built in antenna.

User avatar

rgoldy
Member
Posts in topic: 2
Posts: 167
Joined: Thu Dec 23, 2004 5:49 pm
Location: Sugar Land TX

#4

Post by rgoldy » Wed May 10, 2006 2:00 pm

My apologies. If the hotel provides the service as a complimentary for the guests, then you certainly have permission to use it.
Lead, follow, or get out of the way.
JOIN NRA[/i] JOIN TSRA

User avatar

Topic author
HighVelocity
Senior Member
Posts in topic: 3
Posts: 3374
Joined: Thu Feb 10, 2005 7:54 pm
Location: DFW, TX
Contact:

#5

Post by HighVelocity » Wed May 10, 2006 2:15 pm

No apology needed. I was unclear in the original post and I appreciate you pointing it out. :oops:

"War Driving", which is what it's called when somebody drives around with their laptop looking for an unsecured private network, is highly illegal.

I'm proud to say that when I see a new unsecured network pop up in my neighborhood I try to find out who's house it's coming from and so far I've helped 3 neighbors secure their networks.
It's amazing to me that people will go buy all the hardware to make their own wireless network and not even think twice about security.


txinvestigator
Senior Member
Posts in topic: 1
Posts: 4331
Joined: Wed May 04, 2005 6:40 pm
Location: DFW area
Contact:

#6

Post by txinvestigator » Wed May 10, 2006 2:45 pm

HighVelocity wrote:No apology needed. I was unclear in the original post and I appreciate you pointing it out. :oops:

"War Driving", which is what it's called when somebody drives around with their laptop looking for an unsecured private network, is highly illegal.

I'm proud to say that when I see a new unsecured network pop up in my neighborhood I try to find out who's house it's coming from and so far I've helped 3 neighbors secure their networks.
It's amazing to me that people will go buy all the hardware to make their own wireless network and not even think twice about security.
Just as a service; it is more than stealing to use a wifi signal without authorization:


Texas Penal Code
§33.02. Breach of computer security.

(a) A person commits an offense if the person knowingly
accesses a computer, computer network, or computer system without the
effective consent of the owner.

(b) An offense under this section is a Class B misdemeanor
unless in committing the offense the actor knowingly obtains a
benefit, defrauds or harms another, or alters, damages, or deletes
property, in which event the offense is:.........................





Text
§33.01. Definitions.

In this chapter:

(1) "Access" means to approach, instruct, communicate with,
store data in, retrieve or intercept data from, alter data or computer
software in, or otherwise make use of any resource of a computer,
computer network, computer program, or computer system.

(2) "Aggregate amount" means the amount of:

(A) any direct or indirect loss incurred by a victim,
including the value of money, property, or service stolen or rendered
unrecoverable by the offense; or

(B) any expenditure required by the victim to verify that a
computer, computer network, computer program, or computer system was
not altered, acquired, damaged, deleted, or disrupted by the offense.

(3) "Communications common carrier" means a person who owns
or operates a telephone system in this state that includes equipment
or facilities for the conveyance, transmission, or reception of
communications and who receives compensation from persons who use that
system.

(4) "Computer" means an electronic, magnetic, optical,
electrochemical, or other high-speed data processing device that
performs logical, arithmetic, or memory functions by the manipulations
of electronic or magnetic impulses and includes all input, output,
processing, storage, or communication facilities that are connected or
related to the device.

(5) "Computer network" means the interconnection of two or
more computers or computer systems by satellite, microwave, line, or
other communication medium with the capability to transmit information
among the computers.

(6) "Computer program" means an ordered set of data
representing coded instructions or statements that when executed by a
computer cause the computer to process data or perform specific
functions.

(7) "Computer services" means the product of the use of a
computer, the information stored in the computer, or the personnel
supporting the computer, including computer time, data processing, and
storage functions.

(8) "Computer system" means any combination of a computer or
computer network with the documentation, computer software, or
physical facilities supporting the computer or computer network.

(9) "Computer software" means a set of computer programs,
procedures, and associated documentation related to the operation of a
computer, computer system, or computer network.

(10) "Computer virus" means an unwanted computer program or
other set of instructions inserted into a computer's memory, operating
system, or program that is specifically constructed with the ability
to replicate itself or to affect the other programs or files in the
computer by attaching a copy of the unwanted program or other set of
instructions to one or more computer programs or files.

(11) "Data" means a representation of information, knowledge,
facts, concepts, or instructions that is being prepared or has been
prepared in a formalized manner and is intended to be stored or
processed, is being stored or processed, or has been stored or
processed in a computer. Data may be embodied in any form, including
but not limited to computer printouts, magnetic storage media, laser
storage media, and punchcards, or may be stored internally in the
memory of the computer.

(12) "Effective consent" includes consent by a person legally
authorized to act for the owner. Consent is not effective if:

(A) induced by deception, as defined by Section 31.01, or
induced by coercion;

(B) given by a person the actor knows is not legally
authorized to act for the owner;

(C) given by a person who by reason of youth, mental disease
or defect, or intoxication is known by the actor to be unable to make
reasonable property dispositions;

(D) given solely to detect the commission of an offense; or

(E) used for a purpose other than that for which the consent
was given.
*CHL Instructor*


"Speed is Fine, but accuracy is final"- Bill Jordan

Remember those who died, remember those who killed them.

User avatar

jimlongley
Senior Member
Posts in topic: 1
Posts: 6134
Joined: Wed Jan 12, 2005 1:31 pm
Location: Allen, TX

#7

Post by jimlongley » Wed May 10, 2006 9:38 pm

Brings to mind when kids used to drive around with a wireless phone and pick up signals from peoples' houses, and then make long distance calls.


A couple of weeks ago I was in a Best Western down in Ohio, and hooked up to what I thought was their wireless internet in my room. Only after I decided to have a look at the nets available did I discover that I was using the auto dealership next door's unsecured internet.

BW's signal was way low compared to the auto dealership, and my laptop apparantly just went for the strongest one.

After I left the next morning I called the dealership and told them they might want to reconsider the unsecured part.

Being a modern age boomer lately I might find one of those useful.
Real gun control, carrying 24/7/365

Post Reply

Return to “Technical Tips, Questions & Discussions (Computers & Internet)”