×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Hot Sales In China For Wi-Fi Key-Cracking Kits

timothy posted more than 3 years ago | from the unsecured-is-so-much-nicer dept.

Security 207

alphadogg writes "Dodgy salesmen in China are making money from long-known weaknesses in a Wi-Fi encryption standard, by selling network key-cracking kits for the average user. Wi-Fi USB adapters bundled with a Linux operating system, key-breaking software, and a detailed instruction book are being sold online and at China's bustling electronics bazaars. The kits, pitched as a way for users to surf the Web for free, have drawn enough buyers and attention that one Chinese auction site, Taobao.com, had to ban their sale last year. With one of the 'network-scrounging cards,' or 'ceng wang ka' in Chinese, a user with little technical knowledge can easily steal passwords to get online via Wi-Fi networks owned by other people. The kits are also cheap. A merchant in a Beijing bazaar sold one for 165 yuan ($24), a price that included setup help from a man at the other end of the sprawling, multistory building."

cancel ×
This is a preview of your comment

No Comment Title Entered

Anonymous Coward 1 minute ago

No Comment Entered

207 comments

fp (4, Funny)

Anonymous Coward | more than 3 years ago | (#32105304)

First post using my neighbor's wifi!

I knew this would happen, so I left it Open. (0)

Anonymous Coward | more than 3 years ago | (#32106026)

I left it Open so you would waste your time paying that additional $5 for the software. How does it feel naooo, biatch? Bitches don't know they don't need to pay extra to use my WAP. Besides encryption, I'll be shifting my WAP to some obfuscated authentication algorithms that standard off-the-shelf software drivers on closed-source Operating Systems will not be able to intercept; it derives from a change in the Opensource driver, it might be 50% slower but at-least everyone can see my Open WAP but wonder why the hell they can connect and no packets move around.

No firewall rulls.

Are these available in the states? (3, Funny)

Locke2005 (849178) | more than 3 years ago | (#32105306)

My neighbors have all started encrypting their wireless routers :-(.

Re:Are these available in the states? (4, Funny)

blair1q (305137) | more than 3 years ago | (#32105394)

How are you going to steal my bytes when I don't pub my SSID?

Re:Are these available in the states? (5, Insightful)

Annymouse Cowherd (1037080) | more than 3 years ago | (#32105402)

By sniffing traffic to determine the existence of your network?

Re:Are these available in the states? (0)

Anonymous Coward | more than 3 years ago | (#32105472)

At least nobody said they could rely on a NAT access list for security... yet.

Re:Are these available in the states? (1)

Amouth (879122) | more than 3 years ago | (#32105560)

you know.. i'm one of the lazy ones.. i don't bother with wep or wap or anything else.. just wide open and a mac filter.. why you ask?

because anyone who knows what they are doing can get around a mac filter - 9 out of 10 times that person is doing it because they have a need to fill (aka stuck on this side of down and needs a net connection)

what good is it?? well it stops my neighbors from connecting - and trying to download crap.. instead they just use someone else's - and it makes it simple for my wife to let others on.

as for them "stealing" my traffic.. i don't use public wired connections nor even my own wireless without a VPN tunnel to the router.. or the network i'm working on.

Re:Are these available in the states? (1, Informative)

Anonymous Coward | more than 3 years ago | (#32105624)

because anyone who knows what they are doing can get around a mac filter

Yes and no. It requires a few things to line up before you can just circumvent MAC filters. Namely, you need some legitimate devices on the wireless network to be active before you can use them.

Re:Are these available in the states? (4, Insightful)

GillyGuthrie (1515855) | more than 3 years ago | (#32106062)

and it makes it simple for my wife to let others on.

It seems simpler to configure WPA/WPA2 and just type in a password than to manually configure the router to allow a specific MAC address...

Re:Are these available in the states? (4, Interesting)

mlts (1038732) | more than 3 years ago | (#32106118)

On a side subject, it would be nice for a wireless AP to have the ability to use multiple (like up to 255+) WPA2-PSK keys, one individual key per machine. Yes, this encroaches on WPA-Enterprise, but this would provide the ability to lock out a compromised machine off the network just by zapping its key, as opposed to having to rekey every single box on the wireless segment.

Re:Are these available in the states? (2, Interesting)

bbk (33798) | more than 3 years ago | (#32106288)

There are certain AP's and firmware that have a built-in RADIUS server for WPA/WPA2 Enterprise.

Re:Are these available in the states? (0)

Anonymous Coward | more than 3 years ago | (#32106326)

There is EAP-PSK (used with WPA-Enterprise). Also, IIRC hostapd can use a different key for each peer (using the MAC address to chose the right one) with WPA-PSK.

Re:Are these available in the states? (0)

Anonymous Coward | more than 3 years ago | (#32105526)

It's been 4+ years since I've even looked into this stuff, but I thought you needed a NIC / firmware capable of passive monitoring to do this. Which, essentially, rules out 99% of consumer hardware.

If correct, then it would be stupid to rely on this feature alone, but still smart to enable it as added protection - if you're an asshole who doesn't care that your hidden network may be inadvertently interfering with neighbors' routers.

Re:Are these available in the states? (1)

h4rr4r (612664) | more than 3 years ago | (#32105584)

Maybe on windows. What you need is a driver that supports doing this, OSes where the drivers are not made the by original vendor don't have these limitations.

Re:Are these available in the states? (0)

Anonymous Coward | more than 3 years ago | (#32105692)

I'm pretty sure you are wrong, and it's a firmware/hw issue, but then again, I am no authority. Linux isn't somehow magical in this aspect. I do know that iwlist was severely limited on my Linksys router (using Openwrt).

Even the manpage of iwlist attests to this:

scan[ning]
                            Give the list of Access Points and Ad-Hoc cells in range, and
                            optionally a whole bunch of information about them (ESSID, Qual-
                            ity, Frequency, Mode...). The type of information returned
                            depends on what the card supports.

Re:Are these available in the states? (0)

Anonymous Coward | more than 3 years ago | (#32105928)

Yeah. Your wireless router, which probably is using a binary-only kernel module (this is why so many routers need a 2.4 kernel, BTW), doesn't tell you magical stuff. And you're using the wrong tool anyway, try airodump, kismet, etc.

Re:Are these available in the states? (0)

Anonymous Coward | more than 3 years ago | (#32106268)

This was around four months ago, before I tossed that old Linksys router out, but it was using the b43 driver on the 2.6 kernel. It didn't support monitoring at all.

Re:Are these available in the states? (1)

compro01 (777531) | more than 3 years ago | (#32106054)

What? I haven't seen a wifi card that isn't capable of that, aside from ones that pointblank don't work on Linux without annoying hacks (NDISwrapper), like broadcom-based ones.

You typically can't do that kind of thing on Windows, but it's trivial on Linux.

Re:Are these available in the states? (4, Funny)

Tiger4 (840741) | more than 3 years ago | (#32105806)

See that's where I fool 'em. I don't encrypt my traffic. They'll search all day and never find the key!

Re:Are these available in the states? (0)

Anonymous Coward | more than 3 years ago | (#32105912)

I bet you could write a custom driver that simply XORs all wireless traffic, and be safer than using WPA2. Seriously - who's going to expect you wrote your own (5-minute) encryption?

Re:Are these available in the states? (1)

h4rr4r (612664) | more than 3 years ago | (#32105432)

iwlist still shows it.

Silly windows user.

Re:Are these available in the states? (1)

Rijnzael (1294596) | more than 3 years ago | (#32105460)

The beacons aren't broadcasting the SSID, so you'd still need to sniff even even if it wasn't encrypted.

Re:Are these available in the states? (0, Flamebait)

h4rr4r (612664) | more than 3 years ago | (#32105532)

iwlist shows them just fine.
What do you think "iwlist scanning" does?

Again I say, silly windows user.

Re:Are these available in the states? (2, Insightful)

Rijnzael (1294596) | more than 3 years ago | (#32105702)

You have a fundamental misunderstanding of 802.11 and belligerence/holier-than-thou attitude to boot. An 802.11 access point will not respond to a probe with its actual SSID if it's configured to not broadcast SSID. If it were not heeding this directive, you'd still see the access point using a Windows station. This condition is the express purpose of the "don't broadcast SSID" directive.

You can verify your incorrectness by disabling SSID broadcast on an AP with proper firmware, actually saving the setting, ifconfig interface down/ifconfig interface up and attempting iwlist again. If you see an ESSID other than an empty string in your output, then you'll see the access point on Windows too, provided the band is supported by your Windows wireless hardware as well. Any other result is you doing it wrong or just plain trolling.

The only time you'll see the actual SSID of these types of APs are clients setting the ESSID field in packets they send to the AP, which would require you to sniff.

People like you are a significant contributing factor in the slow adoption of Linux, so thanks for that.

Re:Are these available in the states? (3, Informative)

geekoid (135745) | more than 3 years ago | (#32106146)

There are several tools you can use to get the SSID from a "Non broadcasting" device.

Linux:
http://www.kismetwireless.net/ [kismetwireless.net],
Airjack,
Many others...

Windows:
AirMagnet
AirSnort

I just listed the most common for the particular OS. I do know they can be compiled onto other systems.

If you take a minute to step away from your knee jerk reaction to correcting people and think about it, you would realize* that at some point it has to broadcast the SSID or know one could ever maintain connection.

http://tech.blorge.com/Structure:%20/2008/04/21/wi-fi-mythbuster-do-not-hide-your-ssid/ [blorge.com]

So it is trivial to get an SSID from one that is hidden.

* Against all evidence. I'm assuming your not actually an idiot

Re:Are these available in the states? (1)

Rijnzael (1294596) | more than 3 years ago | (#32106278)

I was just telling parent why 'iwlist' isn't the tool for the job here, I already provided for the 'sniffing' alternative, of which kismet and the rest comprise. 'iwlist' is just like standard Windows and Linux wireless clients in that it sends out probes to look for APs.

Re:Are these available in the states? (1)

h4rr4r (612664) | more than 3 years ago | (#32106154)

I see an ESSID that is blank!
But I see the channel info and all the rest.
Which iwlist shows just fine.
Your point was?

Re:Are these available in the states? (1)

h4rr4r (612664) | more than 3 years ago | (#32106220)

To clear this up for you, it means I can still steal his bits and his network is not magically hidden like you seem to think.
Sure iwlist only told me it was there, but it tells me that now is the time to start logging network traffic to steal those bits.

Re:Are these available in the states? (1)

Rijnzael (1294596) | more than 3 years ago | (#32106318)

"The beacons aren't broadcasting the SSID, so you'd still need to sniff even even if it wasn't encrypted."
My point is, as I said earlier, iwlist isn't the tool for the job for breaking into wireless access points which hide their SSID. You stated that you were able to determine the ESSID of such a network using just iwlist, and I felt the need to point out that you were using it incorrectly, being that you felt the need to denigrate those 'silly Windows users'.

Re:Are these available in the states? (1)

h4rr4r (612664) | more than 3 years ago | (#32106376)

I never stated such a thing, you misread what I wrote, thanks for playing.

"iwlist still shows it".
It being the network I was going to steal bits from. You could have asked for clarification, instead you got offended at a little joke.

Judging by your userID you must be new here. That was a joke too, I am humorously pointing out that your userID is higher than mine.You see denigrating silly windows users is what we do here, again I am making a joke about typical slashdot users.

  If your going to be a jerk about it, you can forget about the free wifi dongle I offered.

Re:Are these available in the states? (0, Flamebait)

h4rr4r (612664) | more than 3 years ago | (#32106390)

To make it even more clear, your "you would need to sniff even if it was not encrypted" uses It in the place of his network the same way I did.

Now go take a break, go upstairs and see your mom and relax. That last part was a joke about basement dwellers on slashdot. Are you keeping up with me?

Re:Are these available in the states? (1)

Rijnzael (1294596) | more than 3 years ago | (#32106404)

So, the comment you're replying to asks innocently "But if I hide my SSID how are you going to find it?" You respond "iwlist shows it silly Windows user". But I'm not to take "it" to mean SSID, when that was the subject of your parent's comment? Heh, no. Your responses to mine have been you trying to save face. I wasn't in need of clarification, you were in need if a little ego check. ;)

Re:Are these available in the states? (0, Flamebait)

h4rr4r (612664) | more than 3 years ago | (#32106458)

The fact is I misread your initial comment. You are still a dweeb who can't take a joke about his use of windows.

Oh and now, no free usb wifi for you kiddo.

Re:Are these available in the states? (1)

h4rr4r (612664) | more than 3 years ago | (#32106632)

It was not, the it must be the network to steal bits from. Why would anyone need the fucking ESSID at all? Steal bytes would be to record his traffic.

To connect to it, you use a different tool to get it. Iwlist shows that you can do this, by showing you that a network is there.

Re:Are these available in the states? (2)

h4rr4r (612664) | more than 3 years ago | (#32106184)

Oh and learn how to take a joke you stick in the mud.

Re:Are these available in the states? (1)

Rijnzael (1294596) | more than 3 years ago | (#32106328)

You: Silly Windows user, iwlist will show them just fine! Me: You can't decloak an AP by sending out probes. That's not how it works.
You: Lulz silly Windows user, iwlist works just fine like I said!
Me: You're wrong and here's why...
You: Lulz I was just joking hahaha!

That about right?

Re:Are these available in the states? (1)

h4rr4r (612664) | more than 3 years ago | (#32106428)

again not what I said.

Good jerb!

The reality is I was talking about getting the network to steal teh bits, you are talking about showing ESSIDs which is but a small part of it. I only need to see if a network is there or not.

Re:Are these available in the states? (1)

Rijnzael (1294596) | more than 3 years ago | (#32106468)

I'll leave you to read the other comment I left for you, though I do need to make a note that you ran through the test I suggested before claiming you were joking. ;)

Re:Are these available in the states? (1)

h4rr4r (612664) | more than 3 years ago | (#32106518)

huh?

I ran the test, it worked proving me right.
It showed a network without an ESSID. Which was my claim from the start.

I have always been joking about silly windows users, I know many of the poor bastards.

Re:Are these available in the states? (1)

techoi (1435019) | more than 3 years ago | (#32106248)

Oh, what I would give for a mod point...Well said!

Re:Are these available in the states? (2, Interesting)

geekoid (135745) | more than 3 years ago | (#32106312)

Except he is wrong. So I'm glad you don't have mod point to help this yahoo make people think a system is hidden just by hiding the SSID.

SSID is trivial to get.

People like him are a significant factor in the slow adoption or proper security procedures. So thank him for that.

Re:Are these available in the states? (1)

Rijnzael (1294596) | more than 3 years ago | (#32106356)

Lol no, I'm not wrong. Read the reply I gave to your other comment before you jump to that conclusion. "I was just telling parent why 'iwlist' isn't the tool for the job here, I already provided for the 'sniffing' alternative, of which kismet and the rest comprise. 'iwlist' is just like standard Windows and Linux wireless clients in that it sends out probes to look for APs."

Re:Are these available in the states? (1)

h4rr4r (612664) | more than 3 years ago | (#32106482)

Yet, it does show networks with blank ESSIDS, which is what my point was.

Re:Are these available in the states? (1)

Rijnzael (1294596) | more than 3 years ago | (#32106512)

And that's not the ACTUAL SSID of the network, LOL! That's what iwlist shows when it cannot determine the actual SSID homeslice.

Re:Are these available in the states? (1)

h4rr4r (612664) | more than 3 years ago | (#32106580)

I DO NOT NEED THE SSID TO STEAL BITS YOU DUMB FUCK!

I only need to know a network is there, then I can record all the traffic I want.

Re:Are these available in the states? (1)

h4rr4r (612664) | more than 3 years ago | (#32106612)

I will simplyfy this for you, since you seem to be quite slow.

With a blank SSID it does not show up in the windows network manager, but iwlist shows a network there. This means the bits can be stolen. Is that too fast for you? It means the original question posed is quite silly.

Re:Are these available in the states? (1)

Rijnzael (1294596) | more than 3 years ago | (#32106436)

Thanks for the support, at least I know someone saw it other than those people in need of a little knowledge and a little less ego. :)

Re:Are these available in the states? (1)

h4rr4r (612664) | more than 3 years ago | (#32106550)

Can you not read?
This is not even my first language and I seem to manage. Ishowed you that iwlist shows networks without an ESSID. It tells you everything but the ESSID meaning the network is not hidden and I can steal the bits.

Re:Are these available in the states? (1)

Rijnzael (1294596) | more than 3 years ago | (#32106588)

This is obvious backpedaling, as I already said. You replied to a commenter who asked "But what if I hide my SSID" that they were a silly Windows user and that `iwlist` will show it just fine. Your argument is like a closed shape with no vertexes.

Re:Are these available in the states? (1, Interesting)

h4rr4r (612664) | more than 3 years ago | (#32106648)

iwlist will show the network, what part of that are you not grasping in your little pea sized brain?

I am not backpedlling. The only thing I made a mistake with is your initial reply, I should have told you that you misunderstood me then.

Hiding the SSID is the action of a silly windows user it accomplishes nothing.

Re:Are these available in the states? (0)

Anonymous Coward | more than 3 years ago | (#32106388)

MCSE much? ...n00b.

Re:Are these available in the states? (0)

Vellmont (569020) | more than 3 years ago | (#32106058)


How are you going to steal my bytes when I don't pub my SSID?

I believe both Netstumbler and Kismet reveal hidden SSIDs. Every wireless node on your network broadcasts the SSID of your network, even if the AP doesn't. If you believe you're safe because you're a sUp3r 3l33t h/-\x0r who hid his SSID, think again. These are entirely trivial and free programs to run that quickly grab your "hidden" SSID.

Re:Are these available in the states? (0)

Pharmboy (216950) | more than 3 years ago | (#32105490)

My neighbors have all started encrypting their wireless routers :-(.

Fortunately for you, you can get one of those Chinese wifi cracking kits cheap. Likely, your neighbors won't be thinking twice about security INSIDE the network, since they "know" they are secure now, making it easier to browse their pr0n collection.

Re:Are these available in the states? (4, Funny)

Locke2005 (849178) | more than 3 years ago | (#32105706)

...making it easier to browse their pr0n collection. My neighbors are all devout Christians, meaning I'm not interested in their pr0n collections -- that shit is WAY too kinky for me!

WEP not secure, use WPA with random key (5, Informative)

Anonymous Coward | more than 3 years ago | (#32105338)

Free Wifi cracking kit: Download here [backtrack-linux.org] and use with brain 1.0 and any USB wireless dongle.

Re:WEP not secure, use WPA with random key (0)

Anonymous Coward | more than 3 years ago | (#32105482)

Nope, not any USB wireless dongles, only those capable of packet injection: http://backtrack.offensive-security.com/index.php?title=HCL:Wireless

That's for WEP ... (4, Informative)

Agarax (864558) | more than 3 years ago | (#32105834)

You don't NEED packet injection, you just need it if you want to break into the network anytime soon. Sitting and listening to normal traffic will eventually get you enough packets to attempt to break it.

For WPA you don't even need packet injection, just deauth a client that is connected, collect their reconnection packets, and then run a dictionary/brute force attack against the handshake.

Re:WEP not secure, use WPA with random key (1)

Kenz0r (900338) | more than 3 years ago | (#32106418)

I've been meaning to buy a wireless dongle for playing around with Backtrack, but I heard not all of them support packet sniffing or packet injection.

Can anyone recommend me a commonly available dongle that would support this, with good Linux drivers?

Re:WEP not secure, use WPA with random key (1)

antdude (79039) | more than 3 years ago | (#32106506)

Any USB wirelss dongles? I never got my old Hawking Technology's Hi-Gain USB Wireless-G Adapter (Model: HWU54D; original version) to work under Linux and Backtrack CD. :(

backtrack? aircrack-ng? (1)

el_tedward (1612093) | more than 3 years ago | (#32105378)

You can already get stuff to do this for free. Is this stuff that's getting sold made for the less technical crowd or something?

Re:backtrack? aircrack-ng? (4, Informative)

SomeJoel (1061138) | more than 3 years ago | (#32105446)

Yeah, hey, look at TFS FFS you SOB:

a user with little technical knowledge can easily steal passwords

Note the lack of an article between "with" and "little".

Re:backtrack? aircrack-ng? (1)

Rijnzael (1294596) | more than 3 years ago | (#32105448)

Where can I get some free wifi USB dongles or PCMCIA cards?

Re:backtrack? aircrack-ng? (1)

h4rr4r (612664) | more than 3 years ago | (#32105620)

I would assume your laptop already has a wireless card, if not I can give you a B one for nothing.

My username at gmail.com if you really want one.

Re:backtrack? aircrack-ng? (-1, Troll)

Anonymous Coward | more than 3 years ago | (#32106490)

h4rr4r@gmail.com

Have fun spam bots. Serves you right for trying to help, you stupid cunt.

Re:backtrack? aircrack-ng? (1)

h4rr4r (612664) | more than 3 years ago | (#32106572)

Yeah, they will have good luck with gmail. Oh noes teh gmail will have more filtering to do, you will surely put google right out of business.

Re:backtrack? aircrack-ng? (0)

Anonymous Coward | more than 3 years ago | (#32106590)

This is the worst thing that has ever happened to you.

Wifi cracker....can I get it at Spencers (1)

irreverant (1544263) | more than 3 years ago | (#32105400)

Sure, I can use AirCrack or a number of techniques or utilities, the same way I can freeze dry my own vomit and make it look like vomit from Spencers, but it's just not the same, Where can I get one of these for the novelty of it. I can't go to Spencers....

Re:Wifi cracker....can I get it at Spencers (1)

h4rr4r (612664) | more than 3 years ago | (#32105550)

It ain't the same because that is not how you make fake vomit. In this case just get the backtrax cd, that is all these kits have.

Video in action (5, Informative)

DNS-and-BIND (461968) | more than 3 years ago | (#32105404)

Video of cengwang ka in action here [ku6.com]. Someone whose mandarin is better than mine will have to provide a translation. "Mee-ma" means password. Heck, I might get one just to use it in airports and other places where jerks charge for internet. Evidently they are illegal as taobao.com [taobao.com] (the Chinese ebay) doesn't list them while a simple google search turns up dozens of vendors. I'll have to check on these next time I go to the computer market.

Another notable aspect of this story is that it's actually accurate. China is a blank slate to most Westerners and I have seen journalists fabricate the most outrageous lies simply because it "fits the narrative" (narrative=preconceived ideas). No surprise the guy who wrote this was in Beijing, it's like the world ends for journalists outside the fifth ring road.

Re:Video in action (1)

grumpyman (849537) | more than 3 years ago | (#32105596)

It seems to me that a lot of +5 insightful/informative comments here in slashdot about China are nothing more than "narrative" but not based on first-person observation/experience.

Re:Video in action (1)

Mashiki (184564) | more than 3 years ago | (#32106128)

First person observation and experience in the old days was called journalism. Now we have reporters travelling the extra bit to make the news, especially when it doesn't fit their narrative.

Re:Video in action (1)

DigiShaman (671371) | more than 3 years ago | (#32105924)

I stay away from the bazaars when I visit Shanghai. Those peddlers can be harder to shake off than fleas on a dog's back.

And no! I don't want a damn "Rolex" watch.

Re:Video in action (0)

geekoid (135745) | more than 3 years ago | (#32106164)

"e jerks charge for internet. "

Those jerks. Paying for bandwidth and maintenance and then having the gall to charge for it.

Re:Video in action (0)

Anonymous Coward | more than 3 years ago | (#32106310)

The internet wants to be free.

RFID/Blink (0)

Anonymous Coward | more than 3 years ago | (#32105414)

Perhaps I'm a bit behind the times, but I'm just as worried about the RFID 'Blink' chip embedded in my new credit card.

Paying for linux (0)

Anonymous Coward | more than 3 years ago | (#32105436)

so lets get this straight, the same chineese who wont pay for windowz, pay for a free linux distro to crack wifi? Genius...cant blame them who wants to pay for windows

I have a question. (2, Interesting)

3seas (184403) | more than 3 years ago | (#32105444)

Why is china or the people of, so interested in causing problems on the internet?

IS this just a way of rebelling that is safe for them from their government (the party they would really like to rebel against.)

Re:I have a question. (1)

DNS-and-BIND (461968) | more than 3 years ago | (#32105512)

Why would they want to rebel against the Party? Since Deng Xiaoping hijacked the people's revolution onto the capitalist road back in 1982, things have only gotten better in the PRC. Every year for the past thirty years has been better than the last. They got the Olympics and now the World Expo, and hell even the President of the United States bows his head [youtube.com] in acknowledgement of China's superiority. Obviously the Party is doing something right.

Re:I have a question. (0)

vxice (1690200) | more than 3 years ago | (#32105862)

Why can't it be that Obama was showing due respect to a fellow world leader. It's not like he was looking the other way while companies ship billions of dollars to a country with a horrible human rights record and labor standards. Or sells us oil to finance terrorist organizations. But yeah you are right the whole bowing thing that is the real problem we can't be seen to be respecting them while we do it in private by selling our souls for $1 a dozen tube socks or a cheap fill up.

Re:I have a question. (1)

geekoid (135745) | more than 3 years ago | (#32106206)

You can get a dozen Tube socks for a buck? sweet.

I don't think the clothes price is as cheap as they should be considering the labor costs.

It's still 10 bucks for 3 FotL underwear!

Re:I have a question. (2, Informative)

DigiShaman (671371) | more than 3 years ago | (#32106094)

Without question, China is on fantastic road to recovery. Each year I go over there, I'm blown away at the level of progress going on. But make no mistake about it, going the capitalist road was rather self-serving of the CCP. The amount of kickbacks and bribery that goes on dwarf that of our American politicians. That's saying a lot.

Re:I have a question. (1, Insightful)

Anonymous Coward | more than 3 years ago | (#32106396)

The CCP has done some smart things. In the usual slashdot style:

1: Send foreign exchange students into American flagship schools.
2: Learn American technology, get degrees in scientists that Americans are driven away from because CS people are considered rejects, nerds, people with "assburger's syndrome", and dweebs compared to the accepted American ideal of actors, singers, coaches, quarterbacks, or sports figures.
3: Head back to China.
4: Use said technological knowledge to do 50 years of advances in 5 years.
5: Use said social and society knowledge to commit espionage on a massive, unheard of scale for IP to use.
6: Offer US companies manufacturing for pennies on the dollar for doing things domestically. More IP in Chinese hands.
7: Strongarm more IP (I'm sure a corporate exec visiting a Chinese plant and held by the police will happily give up their access to the critical file shares if it means that, or visiting one of the black vans and "disappearing".)
8: Use Supreme Court decisions in the US legitimizing foreign presences and dollars to influence US elections.
9: Use Bush's fucked up policies in the Middle East to obtain a sturdy control of oil and energy resources globally.
10: ???
11: Profit. Perhaps just overrun Taiwan just to show that the US doesn't mean jack shit on the world stage anymore.

Re:I have a question. (1, Offtopic)

geekoid (135745) | more than 3 years ago | (#32106180)

I wonder if it is some sort of racist characteristic to assume Obama is doing anything but a normal internationally polite greeting? When any other president did it, no one ever said anything. Hell GW held hands with a Saudi ruler..must have been GAY!!!!1!! or just conforming to local customs.

Re:I have a question. (1)

vxice (1690200) | more than 3 years ago | (#32105802)

No we do it here too. We just have been messing with the internet longer so it is no longer news, damn n00bz.

Backtrack 4 on ebay (3, Informative)

kaptink (699820) | more than 3 years ago | (#32105536)

Out of curiousity I put backtrack in to ebay and what do you know, theres half a dozen backtrack 4 dvds for sale as Hacking Operating System.

But no rerturns accepted!

They should totally market it as... (2, Funny)

Anonymous Coward | more than 3 years ago | (#32106196)

...Kuang Grade Mark Eleven

Chinese people? Stealing something? (0)

Anonymous Coward | more than 3 years ago | (#32106342)

You don't say!

It goes both ways, you know (1)

initialE (758110) | more than 3 years ago | (#32106478)

As much as you stand to benefit by stealing another person's connection, have you ever considered what would happen if they found out, and started spying on your traffic?

little techincal knowledge? (1)

nurb432 (527695) | more than 3 years ago | (#32106536)

The main piece of the kits, an adapter with a six-inch antenna that plugs into a USB port, comes with a CD-ROM to install its driver and a separate live CD-ROM that boots up an operating system called BackTrack. In BackTrack, the user can run applications that try to obtain keys for two protocols used to secure Wi-Fi networks, WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access). After a successful attack by the applications, called Spoonwep and Spoonwpa, a user can restart Windows and use the revealed key to access its Wi-Fi network.

Ya. sure anyone can do it.

WAP uses 16 characters (0, Troll)

bob probst (1805192) | more than 3 years ago | (#32106584)

and they have to crack it brute force. Sure people might still use WEP but they deserve to get hacked.. it's little more than a picket fence.
Load More Comments
Slashdot Account

Need an Account?

Forgot your password?

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>
Sign up for Slashdot Newsletters
Create a Slashdot Account

Loading...