- Joined
- May 15, 2010
- Messages
- 20,089
- Reaction score
- 55,552
Yes but that assumes windows. It is much easier to do in linux.
Yep, it is! It's easier to do everything in linux. Windows is the Father of PITA operations, eh??

Yes but that assumes windows. It is much easier to do in linux.
No special adapter is needed. The WiFi adapter just needs to be able to function in promiscuious mode. I have run a sniffer program on my laptop with off-the-shelf WiFi capabilities.
:floorlaugh::floorlaugh::crazy::rocker:
WHAT could I possibly have been thinking? Of course it was the crazy roving band of Hawaiian-Mexican-Drug-Cartel-WiFiStealing-WhiteRedVan-Maruding-ConstructionCannibals of Lochmere. I mean DUHHH! You are soooo right! They were aimlessly driving around in the early hours of 7/12, found Brad's generously open network with a big 'ole 'Billions & Billions Served C'mon in for FREE all-U-can-google WiFi' welcome sign above, made their way onto Brad's generously unlocked and open computer laptop, did a bunch of Google searches to include Google maps of the dump area, and THEN, in a fortuitous stroke of karmic luck, happened to capture Nancy a mere few hours later when she went jogging in nothing but her pulled up jog bra (imagine the luck!). Well okay maybeeee she did wear socks & shorts but hey, they needed a 'souvenir' to celebrate their good luck in finding such an easy target. No those diamond earrings wouldn't have been of any interest. Pffffttttt. Nosiree. gotta take them there socks and shorts.
Obviously I need to rethink this WHOLE case now!
------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------
BBM
Uh, didn't you forget communist, left-handed and gay????![]()
This part is way more challenging than the phone stuff. I read somewhere that the defense is going to bring someone up to state that WEP security is equivalent to no security at all. This is arguably true for skilled hackers, but not for just a nosey neighbor. You need a special wireless adapter to even try to do this and then you need a lot of patience and willingness to fool with with the software required.
If you get that far, once you are on the network, it's easy to freeload on their broadband and, since you have the special adapter already, to snoop on traffic from other computers on the wireless network. But, actually controlling another computer on the network is pretty unlikely, unless it were intentionally set up for remote access.
For those who may not have seen it, the thread on this forum about the deposition videos-index by time is very helpful. I was just watching Part 7 of the deposition and skipped to the part where he is talking about the dress Nancy wore to the party. He has a pen in his hand and he seems very, very fidgety during this. I haven't watched all the video so I'm not sure if this was unusual but he didn't seem nearly as fidgety when he was talking about earlier in the day on Friday.
I would think the juror questionnaire would have a question or 2 about computer knowledge.
It would not be fair to the state to have a juror was totally computer/tech illiterate in this case.
I know this hasnt been talked about on this thread..but since I missed the first few days of this trial..I missed alot of testimony..Did they play the 911 Call..I ask because I have spent the last hour searching for it..and unable to locate it...I know that Ms Adams made the call..so have to assume it was played after she verified it etc..BUT I just cant find it:maddening::waitasec:
I believe it was made on July 12th..however have no idea on just what stage of search was going on by anyone at that point..TYIA
Sorry to veer so off present topic ( Computer stuff)..just thought I would ask as has been bothering me...:seeya:
Brad's VOIP expertise...admitted he could iniate a remote call.
(Very shaky when asked...note his hesitancy)
VIDEO
http://www.wral.com/news/local/video/3709834/#/vid3709834
12:05 39:23
BUSTED
I wonder if Brad took Katie along with him to dump the body? Most kids that age doze right off when riding in the car. After all, it was the middle of the night, she'd been up all day, playing in the pool, etc., makes kids sleepy. He could have had the child in the car, just speculation here. A possiblity.
This part is way more challenging than the phone stuff. I read somewhere that the defense is going to bring someone up to state that WEP security is equivalent to no security at all. This is arguably true for skilled hackers, but not for just a nosey neighbor. You need a special wireless adapter to even try to do this and then you need a lot of patience and willingness to fool with with the software required.
If you get that far, once you are on the network, it's easy to freeload on their broadband and, since you have the special adapter already, to snoop on traffic from other computers on the wireless network. But, actually controlling another computer on the network is pretty unlikely, unless it were intentionally set up for remote access.