Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Toronto, The Naked City

michael posted more than 12 years ago | from the so-many-networks-so-little-time dept.

Security 212

PunWork writes "In an effort to promote wireless network security, Toronto consulting firm IpEverywhere (pun intended) has published a map of downtown Toronto, showing the location of both encrypted and unencrypted ('naked') wireless networks. Is this going to help spread awareness, or is this just going to encourage people to abuse the (apparently) ignorant? The Toronto Star has a story about the map and the consulting firm here."

Sorry! There are no comments related to the filter you selected.

Easy to build such a map in Toronto (0)

Anonymous Coward | more than 12 years ago | (#4229472)

Just climb on top of the CN tower with your scanning gear.

eh? (1)

digitalsushi (137809) | more than 12 years ago | (#4229475)

Toronto consulting firm IpEverywhere (pun intended)


I dun get it.

Re:eh? (0)

Anonymous Coward | more than 12 years ago | (#4229559)

Well, it could be IP as in the protocol, or IP as in "I. P. Freeley". Does that clear it up for you?

Re:eh? (0, Offtopic)

HP LoveJet (8592) | more than 12 years ago | (#4229828)

I'm going to call my consulting company "Hey Everybody I'm A Stupid Moron With An Ugly Face And A Big Butt And My Butt Smells And I Like To Kiss My Own Butt."

Re:eh? (2)

Jonny Ringo (444580) | more than 12 years ago | (#4229619)

Well the submitter name is "PunWork". So maybe he just constantly tries to find puns that work. I'll I have to say is don't quit your day job PunWork, whatever that is!

Re:eh? (0, Offtopic)

EvilAlien (133134) | more than 12 years ago | (#4229702)

That is his day job, hence 'PunWork'. Maybe he should quit his day job afterall.

Re:eh? (-1, Offtopic)

Anonymous Coward | more than 12 years ago | (#4229815)

I dun get it.

Read it out loud: "I Pee Everywhere". Weak pun, but better than nothing.

Re:neat idea; needs work. (0)

Anonymous Coward | more than 12 years ago | (#4229994)

Read it out loud: "I Pee Everywhere". Weak pun, but better than nothing.

How can this be considered Off-Topic, it was explaining the pun for those that don't get it?

fp (0)

mclaren_1010 (541130) | more than 12 years ago | (#4229477)

fp

Get real.. (2)

unicron (20286) | more than 12 years ago | (#4229480)

Like Toronto's local wardrivers don't have maps that blow that one out of the water.

Re:Get real.. (3, Informative)

unicron (20286) | more than 12 years ago | (#4229513)

Follow up: Wardrive map of the North Pole:

http://www.securitytribe.com/

Navigate it to the wardriving section.

Santa seems pretty lax on security, you'll notice.

Re:Get real.. (1)

BitchAss (146906) | more than 12 years ago | (#4230153)

who has sites? I've got this one [nerdsunderglass.com]

Terror Alert and The Posse Comitatus Act of 1878 (-1, Troll)

Anonymous Coward | more than 12 years ago | (#4229481)

"Sources: U.S. going to 'high' terror alert"

Now, don't confuse this alert with Canary! This is more of a mustardy gold. Now if we go to DEFCON 5 "BLOOD," that means there is a really bad alert. It means we know for sure that there will be terrorism because the CIA contracted it to happen. We have been elevated from the elevated level.

Now, when we are in LOW mode, don't bother even looking for terrorists because they don't exist then because Tom Ridge hasn't seen any, and the payouts are sufficient at the moment to prevent any and all blowback.

In my own PROFESSIONAL opinion, we should have a few more levels, brown a level called SHITTY, color BROWN (could be called DOO DOO for the youngsters) , and yet another YELLOW alert called PISSED (which really represents the modality of the morons, totalitarians and fascists hiding in bunkers coming up with this crap - pissed drunk).

Now, enemies of the state are dubbed enemy combatants and habeus corpus of citizens can be suspended and trivialized even more than usual! More fun! Also, kiss amendment 1,2 and 5 away. (no you cant talk about it, no you cant have a gun and no, your attorney client privledge issupspended) Also kiss ***"The Posse Comitatus Act of 1878 " bye bye!

The Posse Comitatus Act of 1878"
20 Stat. L., 145

June 18, 1878

CHAP. 263 - An act making appropriations for the support of the Army for the fiscal year ending June thirtieth, eighteen hundred and seventy-nine, and for other purposes.

SEC. 15. From and after the passage of this act it shall not be lawful to employ any part of the Army of the United States, as a posse comitatus, or otherwise, for the purpose of executing the laws, except in such cases and under such circumstances as such employment of said force may be expressly authorized by the Constitution or by act of Congress; and no money appropriated by this act shall be used to pay any of the expenses incurred in the employment of any troops in violation of this section And any person willfully violating the provisions of this section shall be deemed guilty of a misdemeanor and on conviction thereof shall be punished by fine not exceeding ten thousand dollars or imprisonment not exceeding two years or by both such fine and imprisonment.

10 U.S.C. (United States Code) 375

Sec. 375. Restriction on direct participation by military personnel:

The Secretary of Defense shall prescribe such regulations as may be necessary to ensure that any activity (including the provision of any equipment or facility or the assignment or detail of any personnel) under this chapter does not include or permit direct participation by a member of the Army, Navy, Air Force, or Marine Corps in a search, seizure, arrest, or other similar activity unless participation in such activity by such member is otherwise authorized by law.

18 U.S.C. 1385

Sec. 1385. Use of Army and Air Force as posse comitatus

Whoever, except in cases and under circumstances expressly authorized by the Constitution or Act of
Congress, willfully uses any part of the Army or the Air Force as a posse comitatus or otherwise to
execute the laws shall be fined under this title or imprisoned not more than two years, or both.

Editor's Note: The only exemption has to do with nuclear materials (18 U.S.C. 831 (e)

But at the Pentagon, at the Federal Emergency Management Agency (FEMA) and at the new Office of Homeland Security (Now being elevated to a 170,000 strong super Agency), officials have been busy updating those plans, particularly the way they relate to using the military as a kind of domestic national police for "continuity of government." For those unaware of fed-speak, this means the protecting of elected officials and bureaucrats from the rest of us, who are viewed as the potential enemy.
Many people feel that the Posse Comitatus act of 1878, might protect them from a police state combining the military and civil law enforcement, with heavy managerial input by the US Department of Justice. But laws are already on the books authorizing martial law, including Section 32CFR 501.4** of the Code of Federal Regulations. These are the rules written by unelected bureaucrats that govern our lives.

In broad based terms, the CFR simply states: "Martial law depends for its justification upon public necessity." **(If you have Adobe Acrobat Reader installed you can view 32 CFR 501.4 in PDF format by double clicking this hyperlink with your left mouse button. You can download by right clicking and then left clicking.) (http://www.dojgov.net/32_CFR_501.pdf)

And let us not forget that vast emergency federal powers by decree dates at least to John Kennedy, who issued a raft of such orders during the Cold War. You can read recent Executive Orders and look up the topics of all modern Executive Orders by going to http://www.archives.gov/search/index.html National Archives and Records. They are difficult to pull up and include Executive Orders 12919, 12656 and 13228. In force today, they reveal how easily our individual liberties and constitutional government can be set aside. For downloads of documents, Right Click on the above Executive Order hyperlinks and Left Click to view or download.

[ http://www.dojgov.net/12919.pdf , http://www.dojgov.net/12656.pdf ; http://www.dojgov.net/13228.pdf ]

With constitutional government "temporarily" placed in the garbage heap, the American people would be subject to direct control by unelected bureaucrats scrambling to shore up a jack boot heel on the dreams of our Founding Fathers.

"Congress shall make no law.." BWAHAHAHAHAH , boy, I'm going to WHOP you!

Re:Terror Alert and The Posse Comitatus Act of 187 (0, Offtopic)

perfessor multigeek (592291) | more than 12 years ago | (#4229864)

You know, it's a real shame that you posted this here because I've actually found this post quite useful. Right info, very wrong place. Trust me, as both a manager, and a long time political activist, the tone and time do count. Otherwise you just become yet another strident Operation Rescue-type wacko discrediting the very concern that you sought to promulgate,
Too bad you didn't have the self control to find a better discussion. Couldn't you at least have posted this as part of a YRO discussion?
Sadly agreeing with the general judgement of TROLL!!,
Rustin

Flash? (0)

Anonymous Coward | more than 12 years ago | (#4229509)

Bah!

its not an "or" situation (4, Insightful)

deft (253558) | more than 12 years ago | (#4229512)

both will happen.

1. the idiots will try and hack and abuse.
2. the companies will slowly gain awareness, try to figure out how to secure themsleves, secure funding, initiate sucurity protocols, fix holes, etc.

gee, i wonder who will get going first. the company or the idiots.

Re:its not an "or" situation (4, Insightful)

rkwright (75860) | more than 12 years ago | (#4229651)

I agree. If you take a look at other areas in computer security (for example, Windows 2000 servers and insecure IIS setups), the actual breakins/worms/etc. have (albeit slowly) caused more admins to lock down their Win2K servers. It has also caused a change for the better with the vendor (Microsoft) in that the next version of their server software (.Net Server 2003) will initially be relatively locked down, and the admin who is configuring the server will have to specifically turn services on. Thus, abusers and intruders have a necessary place by providing the motivation for improving security.

However, with so many consumer-based 802.11 access points out there, I doubt that Joe Homeoffice will even realize how to lock down their networks. In this case, the vendors should start by having as much default security as possible, as well as some helpful reading in the instruction manuals for how to secure your wireless setup.

Re:its not an "or" situation (2)

Jucius Maximus (229128) | more than 12 years ago | (#4229913)

"However, with so many consumer-based 802.11 access points out there, I doubt that Joe Homeoffice will even realize how to lock down their networks. In this case, the vendors should start by having as much default security as possible, as well as some helpful reading in the instruction manuals for how to secure your wireless setup."

I agree. There is a similar lack of security on ResNets by clueless students. Basically at the start of each semester, some of by buddies scan the resnets for insecure machines and print out some security documentation on the printer of the insecure person or deposit a helpful security document on the person's Windows desktop. (I don't actually do this because I don't live in university residence.)

If people did that on wardrives, you might call it 'drive-by security consulting' .

Remeber this as we approach 9/11/2002 (-1)

Strom Thurmond (R-SC (310866) | more than 12 years ago | (#4229524)

By September 10 of last year most Americans had probably grown indifferent to the so-called "culture wars," that decades-long debate over the nature, values, and history of Western and American civilization. Issues such as "political correctness" had passed into fodder for sit-com jokes, and the continuing wrangle over school curricula and textbooks no doubt struck many Americans as a Lilliputian spat of concern only to pointy-head academics, pontificating pundits, and blustering talking heads. Yet the attacks onSptember 11 violently exposed the destructive consequences of the various intellectual and academic movements that had become the received wisdom and dominant orthodoxy of our cultural and political gatekeepers. For example, the doctrine of cultural relativism -- the idea that all cultures are equally valuable, that no basis exists for saying one culture is better than another, and that to say one is better is insensitive ethnocentrism or even racism -- on September 11 was exposed as a dangerous lie. The perpetrators of that mass murder were the products of a specific civilization's dysfunctional view of the world, a civilization whose values are opposed to Western ones such as sex equality, liberal democracy, individual autonomy and freedom, and a limited political role for religion. We hear endlessly about the American fear of the "other," but the WTC murderers were the real cultural chauvinists, so fanatically convinced of the rightness of their way of life that they were willing to kill themselves and 3000 innocents, including fellow Muslims -- an act sanctioned by numerous verses in the Koran.

The cultural relativists of course stepped forward to assure us that, despite those verses, Islam really is a religion of "peace" and "tolerance," but they neglected to explain that the price of "peace" and "tolerance" is the individual's political and social submission to Islam's religious authority. Apologists also explained that the attackers were in fact deviants who had distorted Islamic values. Perhaps, but judging from the spontaneous demonstrations of joy over the attacks that took place throughout the Arab world, and considering the thousands of madrassas still teaching those same "distortions" with government support, apparently millions of Muslims are deluded about their own culture and religion.

Then we were lectured about the "moderates" in the Islamic world that we should support and encourage rather than reducing to "clash of civilizations" paradigms. Yet no one questioned why these so-called "moderates" continually refuse to abandon their inveterate hatred of Israel and sympathy for terrorism evident in their moral and financial support of Palestinian murderers, and in the inevitable "but" that always follows their perfunctory condemnations of the latest slaughter of the innocents. Yes, there exist Islamic moderates who want their civilization to enter the 21st century, but whether or not Islamic culture will or can adapt to the modern, that is, Western way of secularism and individual freedom is a question ultimately to be answered by Muslims themselves. But the question itself is meaningless without some recognition that the Western way is simply superior in key respects, for it creates the greatest freedom and prosperity for the greatest number of individuals; and that cultures that suppress individual freedom and keep millions of its people in penury aren't just different, but inferior.

Next, September 11 demonstrated the bitter fruit of the doctrine of anti-Americanism rife not just in the Middle East and Third World but among many Europeans and Americans themselves. In the months after the attack numerous American and European intellectuals opined that America had in one way or another "deserved" the attacks, that it was reaping the bitter harvest of its numerous imperialist and racist crimes. This irrational superstition, whose ultimate origins lie in communist propaganda, has become a set of cliches and an unthinking reflex fueled by self-loathing, envy, and resentment. Worse, it has no basis in the facts of history.

The truth is, no society in history wielding the cultural, economic, and military power possessed by the United States has been as restrained in using that power. Even if one accepts the usual anti-American indictment -- Chile, Nicaragua, Vietnam -- these alleged offenses pale beside the good America has done in the world, and the blood and treasure it has lost in fighting tyrannies like Nazism, Japanese militarism, and communism. We hear much about Vietnam, but the abandonment of our allies there meant that Vietnam today looks more like the starving police state of North Korea than a free and prosperous South Korea. But the real refutation of America's supposed evil is the sheer numbers of immigrants who risk their lives to live among their presumed oppressors.

Particularly revealing, however, was the outburst of anti-Americanism in Europe that followed a brief few weeks of sympathy for our loss. Nations whose toll of colonial oppression and death in the Third World dwarfed our own now began to lecture us on our crimes. Envy, resentment, post-colonial guilt, and pride wounded by the spectacle of a nation of déclassé cast-offs and immigrants dominating the world found expression in stale cliches about oafish American "cowboys" who lacked the Europeans' sophisticated, nuanced understanding of world affairs. What we should have learned from this shameless display is that the old NATO Cold War consensus is irrelevant in a world dominated by American power, and that a morally exhausted Europe is our "friend" as long as it can spend money on lavish social welfare programs rather than on the military muscle that would justify its global pretensions.

The third cultural disease exposed by 9/11 is the therapeutic sentimentalism that compromises our actions and policies. The thought that anybody, even the Al Qaeda psychopaths, might be made to suffer occasioned all manner of anguished hand wringing. The detainees in Cuba -- murderers one and all -- were fussed over as though they were wayward teenagers caught "experimenting" with drugs. The military action in Afghanistan was hemmed in by demands that no inadvertent deaths occur, something impossible in the "fog" of war. Efforts to protect our citizens against further attack were hamstrung by civil-libertarian fundamentalists who apparently believe any number of American dead is an acceptable price to pay in order to avoid hurting the feelings of an Arab immigrant. A librarian in Boulder who had festooned her library with multicolored plastic penises ordered an American flag taken down lest someone be made "uncomfortable." And everywhere on display was, and still is, our peculiar delusion that peace and order can be created and protected without violence and suffering and the unforeseen, tragic consequences that always attend the use of force.

Finally, and most important, the rot of moral relativism running throughout the intellectual class continues to manifest itself. We were not to blame anyone, as the National Education Association's recent school curricula instructed teachers. We are not to use words like "good" and "evil," those outdated superstitions from our unenlightened past. The President's use of the phrase "axis of evil" to describe three tyrannical, terror-nurturing states aroused all manner of indignation from Eurocrats and liberal pundits, who scoffed at his simplistic and reductive characterization of terror. These were the same people who sneered at Ronald Reagan when he called the Soviet Union an evil empire -- to the cheers of millions of oppressed Eastern Europeans who knew exactly what he was talking about. Perhaps the stupidest example of this moral idiocy was the British editor who forbade the use of "terrorist" to describe the murderers, since "one man's terrorist is another man's freedom fighter." But after all the spineless tweaking and sophistical nuancing is done, the simple fact remains that murderers of the innocent are evil. A culture that has trouble recognizing that fact is a culture in trouble.

Battling this toxic brew of cultural and moral relativism, therapeutic sentimentalism, and malevolent anti-Americanism is what the culture wars are all about. In the first few months after 9/11 it seemed that the tide had turned against these noxious ideas. Flags were being flown without embarrassment, church pews were more crowded, public recognition of America's unique achievement in giving freedom and prosperity to the greatest number ever of ordinary people was freely celebrated. But since then the old bad habits seem to be creeping back, as evidenced by the dithering and second-guessing over Iraq and its homicidal maniac of a leader. After the sentiment and spectacle of the anniversary ceremonies of 9/11 is done, the question will remain whether or not we have learned enough to make sure 9/11 never happens



Ironically... (3, Funny)

Anonymous Coward | more than 12 years ago | (#4229535)

The map on the site doesn't cover Toronto's nude beach at Hanlan's point.

Re:Ironically... (-1, Offtopic)

Anonymous Coward | more than 12 years ago | (#4229765)

Nude beach in Toronto? Seems pretty cold to me. It must be where people only wear 2 layers of clothing. zing.

Re:Ironically... (0)

Anonymous Coward | more than 12 years ago | (#4229821)

Hmm... You must be one of those idiot that bring skiing equipment here to Toronto in the middle of July.

The weather today in Toronto is 34 celcius, that's 90F plus.

Re:Ironically... (0)

Anonymous Coward | more than 12 years ago | (#4229907)

i work tech support for a company in waterloo . And deal mainly with americans..

If i only had a tape recorder for half of the telephone calls.

I truly think most americans beleive there is no other country than the US of A..

sad....

Reality Check (0)

Anonymous Coward | more than 12 years ago | (#4229961)

I like to give Americans a reality check by telling them that the southeast end of southern Ontario is farther south than northernmost California. They invariably don't believe it. Then I pull out a map and show them.

that's 90F plus (0)

Anonymous Coward | more than 12 years ago | (#4230030)

The weather today in Toronto is 34 celcius, that's 90F plus

93.2F, and that's before you factor in the humidity. The current "humidex" is 37C which is 98.6F. Thank god we all live in igloos - we just get naked and lean on the walls to cool off.

Re:Ironically... (0)

Anonymous Coward | more than 12 years ago | (#4229938)

Dude, that is a gay nude beach. Consider this a warning.

Hot fast & dirty (-1, Offtopic)

Anonymous Coward | more than 12 years ago | (#4229544)

Creating ActiveX Components
See Also

Component software development cuts programming time and produces more robust applications, by allowing developers to assemble applications from tested, standardized components. The move to component software, sparked by the success of products like Microsoft Visual Basic, is one of the most prominent trends in the software industry.

Microsoft has led the effort to define an open, extensible standard for software interoperability. The Component Object Model (COM), including Automation and the ActiveX specification, makes it possible for software components you create to work smoothly with software components you buy off the shelf.

Visual Basic makes ActiveX component creation happen. ActiveX controls, ActiveX Documents, code components, and applications that provide objects -- Visual Basic gives you the tools to rapidly create, debug, and deploy software components.

Getting Started
Before you begin, you should know how to use class modules to define new classes, how to create objects from classes, and how to use ActiveX components. These subjects are discussed in "Programming with Objects" and "Programming with ActiveX Components," in the Visual Basic Programmer's Guide.

Chapters
ActiveX Components
Outlines what you can do with Visual Basic's component software features.

Creating an ActiveX DLL
Provides step by step procedures that get you off to a running start with in-process debugging, multiple projects, global objects, object lifetime concepts, and circular references.

Creating an ActiveX Exe Component
Provides step by step procedures that introduce threads, events in class modules, call-backs, and out-of-process debugging.

Creating an ActiveX Control
Provides a series of step by step procedures that create a simple control. Introduces ActiveX control concepts, raising events, debugging design-time behavior, and property pages.

Creating an ActiveX Document
Provides a series of step by step procedures that create a simple ActiveX document, and demonstrate ActiveX document concepts, navigation, properties and methods, menus, and debugging techniques.

General Principles of Component Design
Contains information of importance to all component designers, including terminology, concepts, instancing for class modules, polymorphism, and object models.

Debugging, Testing, and Deploying Components
Contains more general information, such as setting up test projects, debugging features, adding Help, version compatibility, and localization.

Building Code Components
Takes OLE servers into a new world, providing in depth discussions of in-process and out-of-process components, threading, instancing, call-backs, and events.

Building ActiveX Controls
Contains in-depth explanations of how Visual Basic ActiveX controls work, what features you can implement, subtleties of debugging, discussions of implementation techniques, and all the other things you expect of a cool new feature.

Creating Property Pages for ActiveX Controls
Provides in-depth discussion of property pages, including implementation techniques and design guidelines.

Building ActiveX Documents
Provides in-depth discussions of terminology, concepts, Internet features, navigation, debugging, migrating from forms, and in-process vs. out-of-process implementation.

Building Data Sources
Provides in-depth discussion and step-by-step procedures for creating ActiveX components that can act as data sources.

ActiveX Component Standards and Guidelines
Contains updated guidelines for object naming, component shutdown, implementing collections and Application objects, and other object model issues.

That's lame (2, Insightful)

Jonny Ringo (444580) | more than 12 years ago | (#4229547)

Unencrypted networks are now referred as "naked" networks? They just called it that to get more people to read it.

Maybe someone should make a new insecure Linux distro called "Naked Linux". It will be great for the desktop to compete with Windows whom has always been naked. (Maybe that's Red Hats secret Plan). In the mean time Windows is trying to get dressed. Stupid 2 legged pants!

Re:That's lame (2)

Soko (17987) | more than 12 years ago | (#4229827)

It will be great for the desktop to compete with Windows whom has always been naked. (Maybe that's Red Hats secret Plan).

Well, the latest RedHat beta is now called "null", so you never know...

Soko

Re:That's lame (1, Offtopic)

(trb001) (224998) | more than 12 years ago | (#4230155)

Oh, would that distro come pre-installed with this [virtuagirl.com] ?

--trb

Its obvious! (2)

FortKnox (169099) | more than 12 years ago | (#4229551)

Is this going to help spread awareness, or is this just going to encourage people to abuse the (apparently) ignorant?

I'd put my life savings on the aduse of the ignorant.

Lets see, annually, people get viruses from opening attachments in their emails. How many people, do you think, get re-infected because of ignorance?

How many people go to windowsupdate.microsoft.com for security patches?

Yeah, most IT people know what they are doing, and don't do anything foolish with their security, but you know that a lot of average users are learning to setup networks, and setting up a wireless network isn't exactly rocket science.

I anticipate a lot of abuse in the city of Toronto...

Re:Its obvious! (4, Insightful)

Anonymous Coward | more than 12 years ago | (#4229635)

Yeah, most IT people know what they are doing, and don't do anything foolish with their security, but you know that a lot of average users are learning to setup networks, and setting up a wireless network isn't exactly rocket science.
HAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHAHA!

oh man that is really funny!

Most IT people dont know squat. and very very few of them know much about, let alone even understand security.

If your statement were true then corperate break ins and virus's would be a much smaller problem.. 99% of all virus attacks I get are from INSIDE corperate coming from the T1 ties to the NOC not from any of my users or the internet gateway I have. Whenever there's a discussion about Virus scanners and basic virii security.. over 1/2 the IT professionals on the conference call have no idea how to ensure that all the machines are up to date or protect their networks.

Also, I have had to resort to firewalling the corperate side to protect my network... Yes, the TRUSTED corperate network T1 tie is firewalled by me to keep out attackers and virii.

I am one of about 700 IT professionals in my corperation... and I have to spend valuable time securing my network from the bungling boobs that this company hired.

Life Savings.... (0)

InOverMyFeet (576320) | more than 12 years ago | (#4229730)

I'll see your $12.67 and raise you another $5.

...couldn't resist:)

Hey, Wow! (-1, Offtopic)

Anonymous Coward | more than 12 years ago | (#4229552)

Who gives a shit?

map here (1, Informative)

Anonymous Coward | more than 12 years ago | (#4229554)

http://www.nakedwireless.ca/winudcol.htm

No map there either (0)

Anonymous Coward | more than 12 years ago | (#4229806)

I still get a puzzle piece prompting me to download a closed source plugin to see the map. Anyone running an insecure box care to take a screenshot and link to it?

Spammers (5, Insightful)

The Turd Report (527733) | more than 12 years ago | (#4229561)

I wonder how long it will take spammers to clue in on this? It is a wonderful deal for spammers; as they are untraceable via this method. There are steps that people running these networks could do to prevent spammers, but still allow legit users. But, you all know how well some admins look after security...

Re:Spammers (1)

kavau (554682) | more than 12 years ago | (#4229666)

Drive-by spamming.

Ugh...

Re:Spammers (1)

EvilAlien (133134) | more than 12 years ago | (#4229669)

They spammers are already all over this like a fat kid on a smartie. Check out my comment below for URLs [slashdot.org] n stuff.

Re:Spammers (1)

Jucius Maximus (229128) | more than 12 years ago | (#4229838)

"I wonder how long it will take spammers to clue in on this? It is a wonderful deal for spammers; as they are untraceable via this method. There are steps that people running these networks could do to prevent spammers, but still allow legit users. But, you all know how well some admins look after security..."

Damn, stop giving them ideas!

I'll Give Admins Some Ideas Too Then. :) (1)

The Turd Report (527733) | more than 12 years ago | (#4229943)

  1. Block outbound/inbound port 25 traffic, except to/from local MX. Or, block it totally, if possible.
  2. Block common proxy ports.
  3. Route all HTTP traffic thru a secured proxy.
That should cut off most of the routes that spammers use to spam. Any WLAN that does not take these steps will soon become a spammer magnet.

Re:Spammers (1, Informative)

jeffy124 (453342) | more than 12 years ago | (#4229874)

hmmm. I only tried submitting an article dealing with that topic last week [slashdot.org]

... obligitory simpsons reference (1, Offtopic)

edrugtrader (442064) | more than 12 years ago | (#4229566)

i don't quite understand this... lets do an interview with the author.

Mr. Freely? come on guys, I.P. Freely!?

VANCOUVER IS SO MUCH COOLER THAN TORONTO (-1, Offtopic)

Anonymous Coward | more than 12 years ago | (#4229576)

No doubt.

Fuck you Hippie (-1, Offtopic)

Anonymous Coward | more than 12 years ago | (#4229633)

You and your goat fucking, tofu eating clan suck ass

thank you!!!

I don't think so, Baffin (-1)

Anonymous Coward | more than 12 years ago | (#4229670)

Eh?

A little to much Fromage in Toronto, eh?

HAHA, sucker!

Let me walk outside and, ahhhh, Vancouver.

Ha ha canucks are so retarded (-1, Offtopic)

Anonymous Coward | more than 12 years ago | (#4229708)

Fucking canadians, they suck so much cock!!!


Nothing good ever came from that frozen wasteland!!

Re:Ha ha canucks are so retarded (0)

SkankhodBeeblebrox (581971) | more than 12 years ago | (#4229767)

Not to fall for the troll, but I assume he realizes the US share a fairly substantial border with Canada, and as such, share a fairly substantial amount of weather with Canada :P

Re:Ha ha canucks are so retarded (0)

Anonymous Coward | more than 12 years ago | (#4229861)

Isn't something like 17 US States wholly or partially further north than Windsor, Ontario? A mere 4 hours drive SW of Toronto. Right now I'd be happy to see some snow as I'm sick of this heat, humidity and smog.

While Bush Fucks America, Canada Just Looks Better (0)

Anonymous Coward | more than 12 years ago | (#4229925)

Tired of Bush?

Fuck it. Move to Canada. A real, civilised, modern nation. Who would have thought?

Excellent healthcare FOR EVERYONE, excellent schools, the most pristine nature in North America. Cool cities, great people.

Why get shot in the 'hood when you got Canada in yo hood?

Canada loves you, and we love Canada.

And really, there is no place like B. C. It Owns!

Re:While Bush Fucks America, Canada Just Looks Bet (1, Offtopic)

iplayfast (166447) | more than 12 years ago | (#4230088)

And yesterday Ontario just had our 25 smog alert day of the year. Beating our all time record. :(

So much for our pristine nature.

Computer viruses go airborne (4, Interesting)

jhines0042 (184217) | more than 12 years ago | (#4229584)

People get viruses delivered the their computers via email, the net, etc...

What is to stop viruses now becoming "airborne" and people who use an open wireless network unwittingly picking them up or (knowingly or unknowingly) transmitting them into open wireless networks?

Surely most people who wardrive would be smart enough to avoid them through various means... but most people who use computers are fairly clueless about security and virus protection.

Any known cases of wifi virus infection?

Re:Computer viruses go airborne (2)

Cecil (37810) | more than 12 years ago | (#4229880)

For a virus to be able to infect your system simply by sending a network packet to your machine, that requires that someone first finds a remote root vulnerability within the network stack of your operating system.

IIRC, This has happened, and may happen again, but it's REALLY REALLY UNTHINKABLY RARE. Most network stacks have been rock solid for 30 or 40 years.

So yes, it's a nice, scary theory. But I wouldn't bet on it happening any time soon.

Re:Computer viruses go airborne (2)

jhines0042 (184217) | more than 12 years ago | (#4229995)

Nice scary theory, but...

Lets say I have a computer that is infected with a virus. This virus (say Klez) looks for network shared drives to copy itself to.

I also have a 802.11b network.

Someone has a laptop with a shared network drive with, for some reason (ignorance), full permissions turned on.

Said person logs into my network because they are nearby and their network card finds the network (windows XP does this nicely) and then Klez, running on my machine, finds your network drive and copies itself there as "readme.txt.exe" or something else like that.

Could be more likely than you might want to think. Only involves two stupid people in proximity who have technology they don't understand to have it happen. I can't even swing a dead keyboard* and not hit two idiots with Technology around here.

(*swinging dead cats is just too hard)

Re:Computer viruses go airborne (0)

Anonymous Coward | more than 12 years ago | (#4229996)

That's not how you'd do it...

The idea is that normally a virus' only entry point into a 'safe' coprorate network is via some sort of service (such as email, or web).

Imagine you have access to a company's LAN, and because of poor security, you are able to access files of a computer over NetBIOS. All you need then is to replace some file on a computer and you have implanted a virus via airwaves.

It's actually more of a Trojan at that point, but still...

It's not so far fetched.

Re:Computer viruses go airborne (0)

Anonymous Coward | more than 12 years ago | (#4229921)

This is bad. If aliens are running a SETI project, they might get infected. We wouldn't want to start an interstellar war that soon, now do we?

Yuck! (0)

Anonymous Coward | more than 12 years ago | (#4229586)

When I read that headline, my first though went out to several Toronto women I know... Naked... Ick! May God (or whatever deity you believe in) have mercy on our souls if that were to happen.

Up your ass with a piece of glass (-1, Offtopic)

Anonymous Coward | more than 12 years ago | (#4229591)

Platform SDK: Remote Procedure Call (RPC)

RpcServerUseAllProtseqsEx

The RpcServerUseAllProtseqsEx function tells the RPC run-time library to use all supported protocol sequences for receiving remote procedure calls.

RPC_STATUS RPC_ENTRY RpcServerUseAllProtseqsEx(
unsigned int MaxCalls,
void* SecurityDescriptor,
PRPC_POLICY Policy
);

Parameters
MaxCalls
Backlog queue length for the ncacn_ip_tcp protocol sequence. All other protocol sequences ignore this parameter. Use RPC_C_PROTSEQ_MAX_REQS_DEFAULT to specify the default value. See Remarks.
SecurityDescriptor
Pointer to an optional parameter provided for the Windows XP/2000/NT security subsystem. Used only for ncacn_np and ncalrpc protocol sequences. All other protocol sequences ignore this parameter. Using a security descriptor on the endpoint in order to make a server secure is not recommended. This parameter does not appear in the DCE specification for this API.
Policy
Pointer to the RPC_POLICY structure, which allows you to override the default policies for dynamic port allocation and binding to network interface cards (NICs) on multihomed computers (computers with multiple network cards).
Return Values

Value Meaning
RPC_S_OK The call succeeded.
RPC_S_NO_PROTSEQS There are no supported protocol sequences.
RPC_S_OUT_OF_MEMORY Sufficient memory is not available.
RPC_S_INVALID_SECURITY_DESC The security descriptor is invalid.

Remarks
The parameters and effects of RpcServerUseAllProtseqsEx subsume those of RpcServerUseAllProtseqs. The difference is the Policy parameter, which allows you to restrict port allocation for dynamic ports and allows multihomed machines to selectively bind to specified NICs.

Setting the NICFlags field of the RPC_POLICY structure to zero makes this extended API functionally equivalent to the original RpcServerUseAllProtseqs, and the server will bind to NICs based on the settings in the system registry. For information on how the registry settings define the available Internet and intranet ports, see Configuring the Windows XP/2000/NT Registry for Port Allocations and Selective Binding.

Note The flag settings in the Policy field are effective only when the ncacn_ip_tcp or ncadg_ip_udp protocol sequence is in use. For all other protocol sequences, the RPC run-time ignores these values.

A server application calls RpcServerUseAllProtseqsEx to register all supported protocol sequences with the RPC run-time library. To receive remote procedure calls, a server must register at least one protocol sequence with the RPC run-time library.

For each protocol sequence registered by a server, the RPC run-time library creates one or more endpoints through which the server receives remote procedure call requests. The RPC run-time library creates different endpoints for each protocol sequence. The endpoint name is generated by the RPC run time or the operating system. For example, for ncacn_ip_tcp, the port number is dynamically determined by the RPC run time, depending on availability and registry settings.

Note Using the RpcServerUseAllProtseqsEx function does not cause the server to listen on the following protocol sequences:

Note ncacn_nb_nb

Note ncacn_nb_tcp

Note ncacn_nb_ipx

Note ncadg_mq

Note ncacn_at_dsp

Note ncacn_http.

Note To listen on any of those protocol sequences, each sequence must be selected individually.

For MaxCalls, the value provided by the application is only a hint. The RPC run time or the Windows Sockets provider may override the value. For example, on Windows XP Personal and Professional, or Windows 2000 Professional, the value is limited to 5. Values greater than 5 are ignored and 5 is used instead. On Windows XP/2000 Server, Advanced Server, and Datacenter Server the value will be honored.

Applications must be careful to pass reasonable values in MaxCalls. Large values on Server, Advanced Server, or Datacenter Server can cause a large amount of non-paged pool memory to be used. Using too small a value is also unfavorable, as it may result in TCP SYN packets being met by TCP RST from the server if the backlog queue gets exhausted. An application developer should balance memory footprint versus scalability requirements when determining the proper value for MaxCalls.

To selectively register protocol sequences, a server calls RpcServerUseProtseqEx, RpcServerUseProtseqIfEx, or RpcServerUseProtseqEpEx. See Server-Side Binding for a description of the routines that a server will typically call after registering protocol sequences.

Requirements
Windows NT/2000/XP: Included in Windows NT 4.0 and later.
Windows 95/98/Me: Unsupported.
Header: Declared in Rpcdce.h.
Library: Use Rpcrt4.lib.

See Also
Configuring the Windows XP/2000/NT Registry for Port Allocations and Selective Binding, RpcServerUseAllProtseqsIfEx, RpcServerUseProtseqEx, RpcServerUseProtseqEpEx, RpcServerUseProtseqIfEx

Maps (2)

NetJunkie (56134) | more than 12 years ago | (#4229593)

Which other sites show maps of APs? I'd like to see if my neighbor's is on there. Wide open...default password on the router...

I thought I remember seeing a site once where you could just enter a zip code to get an idea.

Toronto, the most secure city? (2)

dattaway (3088) | more than 12 years ago | (#4229599)

It might be that all these points are simply honeypots.

Did they make tcp connections to find out?

United States Consulate - honeypot? (2, Informative)

Malc (1751) | more than 12 years ago | (#4229793)

It looks like two of the pins are almost in the right spot for the US Consulate (although it might be the next building up the road). Honeypot or clueless government officials?

Wireless nodes.. (4, Funny)

ldopa1 (465624) | more than 12 years ago | (#4229601)

Cool, now when I go to Toronto, I have a map of all of the Starbucks downtown...

Re:Wireless nodes.. (2)

Jucius Maximus (229128) | more than 12 years ago | (#4229863)

"Cool, now when I go to Toronto, I have a map of all of the Starbucks downtown..."

You don't need a map. If you're in the core, all you have to do is turn yourself around 360 degrees and you will most likely see a coffe shop, probably a Starbucks or Timothy's (not to be confused with Tim Horton's.)

Toronto (-1, Offtopic)

Anonymous Coward | more than 12 years ago | (#4229604)

You see Michael, the problem with this story - like so many stories on slashdot - is that NOBODY CARES about this pointless bullsh*t.

IpEverywhere (0, Offtopic)

bond485 (600768) | more than 12 years ago | (#4229613)

Um, I wish I had thought of that. Damn. Gotta go mark my territory now..

Re:IpEverywhere (0)

Anonymous Coward | more than 12 years ago | (#4229816)

Prior Art citation:
I have two white T-shirts given out by Cisco at an IETF meeting (and other events) in 1999 which says "IP Everywhere" on the back under a graphic of Calvin of "Calvin & Hobbes" p-ing. On the front, it shows the Cisco logo and "Cisco 12000 Series Gigabit Switch Router".

Let's hear it for the government! (1)

Phil the Canuck (208725) | more than 12 years ago | (#4229618)

I can only assume that those red pins in and around Queen's Park are part of some government "Broadband for the Masses" program. Surely the government would never be lax on security.

For those who don't know, Queen's Park is the seat of the Ontario government.

Re:Let's hear it for the government! (1)

beaverfever (584714) | more than 12 years ago | (#4229775)

Although Queen's Park has a few pins stuck in it, the rows of red to the left of it are all University of Toronto - Engineering school is on College Ave. just west of Queen's Park if memory erves me correctly... Lots of red down there... hehe, Let's hear it for the engineers!

IpEverywhere? (-1, Offtopic)

SlashdotTroll (581611) | more than 12 years ago | (#4229642)

I don't mean for the following to be excepted as a troll...(pun intended)

My company specializes in low latency data chunks and loss-less throuput. Come by and see my company profile, IpooEverywhere [goatse.cx] . We are currently releasing positions, so don't ask for a work load.

Yay, more drive-by spam. (4, Interesting)

EvilAlien (133134) | more than 12 years ago | (#4229647)

All we need is more drive-by spam [com.com] .

Thats right, the scum of the network are taking advantage of open wireless networks, whether they are chalked or grabbed off online maps such as net stumbler dot com [netstumbler.com] . The rise of drive-by hacking [bbc.co.uk] is a natural by-product of the wardriving/chalking community, and it would be naive to considering this a surprising development. Highjacking an open wireless network is only the smart thing to do for hackers whether they are after data or just a spamming platform.

This puts the pressure on network administrators to secure their wireless networks. It is far easier to drive by a NAP and jack in, and the proliferation of wireless networks could obsolete physical intrusion techniques such as connecting a Dreamcast or iPAQ [slashdot.org] to an internal network. Tools for wardriving are readily available, such as THC-warDrive [thehackerschoice.com] . A lazy or incompetant network administrator makes it easy for a kid with the parents car, a pringles can, and a laptop.

*Yawn* (2)

PureFiction (10256) | more than 12 years ago | (#4229657)

This is news? People have been [cubicmetercrystal.com]
scanning wireless [wardriving.com]
networks [securitytribe.com]
for a long time now...

We Live In Toronto! (-1, Offtopic)

Anonymous Coward | more than 12 years ago | (#4229707)

T-O-R-O-N-T-O!

Humble and Fred, two married guys, that bum-fuck each other!

Uncle Vince, hello there girlfriend, da da da!

www.mojoradio.com

Shut up mongoloid (-1, Offtopic)

Anonymous Coward | more than 12 years ago | (#4229756)

You and your assfucking, cumguzzling friends suck ass!

Accuracy of map? (1)

beaverfever (584714) | more than 12 years ago | (#4229710)

How accurate could/should a map like this be? Last time I was in Toronto the NW corner of Jarvis/Dundas (right side, middle of map) was a parking lot, but there are a few red flags there... does that make sense? Admittedly, the parking lot could have been built upon in the past few months, but I doubt it. Or someone could be running a network from their van. Or I just don't know enough about this sort of thing.

Jez curious is all...

Re:Accuracy of map? (1)

beaverfever (584714) | more than 12 years ago | (#4229801)

Okay, maybe those pins are on the SW corner of Jarvis and Dundas, but that is a discount store selling cheap plastic crap or something like that... doesn't make sense. Still curious.

Re:Accuracy of map? (1)

MagicFab (7234) | more than 12 years ago | (#4229976)

Red flags indicate signal detection, not signal origin...

Re:Accuracy of map? (1)

beaverfever (584714) | more than 12 years ago | (#4230070)

ohhh, right... why didn't I think of that? I'll be going back to sleep now. Thanks :)

Re:Accuracy of map? (1)

great_flaming_foo (561939) | more than 12 years ago | (#4230096)

If I remember my netstumbler 101 class correctly the pins are where they were when they spoted the network. So the AP is most likely in a near by building but they spoted it while sitting in the parking lot. The company I work for does wireless and I have seen netstubler logs that spoted our AP like twenty miles from its accutal location.

Re:Accuracy of map? (0)

Anonymous Coward | more than 12 years ago | (#4230149)

It's part of Lastman's new social platform, "802.11 For Scumbags and Crackheads."

You missed the other Naked Reference... (2)

RobinH (124750) | more than 12 years ago | (#4229718)

Direct from Toronto: Naked News!!! [nakednews.com]

A quote (1)

JazerWonkie (598827) | more than 12 years ago | (#4229723)

A quote taken from a CEO in fits of rage when he finds out that his company is on that list:

Fire the Net Admin, and call our lawers were going to see IpEverywhere in Court

Bang the Marketing Drum (1)

DaytonCIM (100144) | more than 12 years ago | (#4229727)

This sounds like a consulting firm drumming up business for themselves. Kind of like the telemarketers that call everyday offering to sell us toner at a reduced rate.

Re:Bang the Marketing Drum (-1)

Anonymous Coward | more than 12 years ago | (#4229798)

Uhm, wouldn't it make more sense for the telemarketers to FAX you every day offering toner at a reduced rate?

the map fails.... (2)

Lumpy (12016) | more than 12 years ago | (#4229744)

What about properly secured public/community wireless portals that use nocatnet [nocat.net] for user authentication? they dont use WEP as it's useless for this kind of community access point. while nocatauth does quite well at making open portals available for members.

An old story gets worse (1)

phorm (591458) | more than 12 years ago | (#4229763)

In the old days... when somebody had an easily accessed jack to their phone system into which you could plug a phone (or modem, although laptops weren't as popular) and make long distance calls

Today, when people have a wireless "jack" to which large masses of people can plug in and make use of their connection/network/internet.

Seems to me that as technology progresses so do the ways to abuse it, and the stupid ways in which people leave themselves open to abuse...
General Public Ignorance keeps me employed - phorm

ALLAH IS A PIG'S CUNT (-1, Offtopic)

Anonymous Coward | more than 12 years ago | (#4229766)

Death to Allah, the cruel, the false, the stupid. Destroy Islam. May justice prevail.

Unsecured networks at US Consulate? (2)

td (46763) | more than 12 years ago | (#4229785)

There's a pair red pins (unsecured WAPs) on the west side of University Avenue between Dundas and Queen, right about where the US Consulate is.

Unencrypted != unsecured (5, Insightful)

Leto2 (113578) | more than 12 years ago | (#4229833)

People, unencrypted by WEP doesn't mean unsecured. We all know 802.11 WEP has its shortcomings, so more and more administrators are relying on different techniques to secure their wireless LAN, IPsec and VPN to name a few.

And after you've secured your network on a higher level than OSI 1, you can be less paranoid about WEP. So much less, that some claim that DISabling WEP is not a bad thing at all. Think about it, you already have encryption taken care of, so why not make your network more stable, robust and fast by disabling WEP?

Those 'wardriving' pictures should make a distinction between "secured with WEP", "no WEP, but I cannot use the network because of IPsec/VPN/whatever" and "no WEP, and I can surf freely through it".

-Leto2

Re:Unencrypted != unsecured (2, Insightful)

MagicFab (7234) | more than 12 years ago | (#4230022)

At the very least, change the legend so it reads:
WEP Enabled (Worse, false sense of security) instead of:
WEP Enabled (Good)

the image.... (2, Offtopic)

_ph1ux_ (216706) | more than 12 years ago | (#4229859)

...in my head was of naked warwalkers. but, isnt it cold in toronto? just think of the shrinkage.

Re:the image.... (0)

Anonymous Coward | more than 12 years ago | (#4229908)

I wish...the temperature in Toronto at the moment is 34C (for those of you who are SI-challenged, that's 93F).

You don't need a map (3, Funny)

wytcld (179112) | more than 12 years ago | (#4229867)

As the map shows, about anywhere you go in Toronto, there's open access. Since there is no crime in Canada, this is not a problem, it's a feature.

Uh-oh. (2)

Soko (17987) | more than 12 years ago | (#4229899)

Queens Park (look on north portion of the map) is the seat of the Ontario Provincial Legislature, not an open, green space. This means that there are (or were) 2 open, non WEP (like that mattered) access points within the government offices. I really, really hope these are isolated from the internal network via firewalls - I don't want all of the info that the Ontario Government has on it's citizens (like me and my family) being broadcast for anyone to see/save/use.

Soko

Re:Uh-oh. (2)

p3d0 (42270) | more than 12 years ago | (#4230007)

Actually, it's both. There is a small (5-minute-walk diameter) park north of the government buildings. Of the Queen's Park oval, probably 40% of it is buildings. (It's the gray part of the map.)

I work in IT... (3, Funny)

wo1verin3 (473094) | more than 12 years ago | (#4229918)

With IT people in the Toronto area... here is how serious they took this map.... Several of them wanted to know if we could find the blinking red dot over their house. :(

Arg, they keep making that mistake!! (1)

ch-chuck (9622) | more than 12 years ago | (#4229934)

while black triangles indicate networks protected with WEP -- "wireless equivalent privacy" -- encryption.

I know it's a wireless technology, but WEP is (in theory at least) wired equivalent privacy - that is, it's supposed to be about as good and private as cat5, arrrrrg!

This is a problem everywhere! (2)

Newer Guy (520108) | more than 12 years ago | (#4229959)

This is a problem in just about every city. I live on a tree lined residential street in Santa Monica, CA. There's no real offices or businesses within about a half mile because I live between two public parks. I was planning on putting in a wireless network in my house so I bought a card and put it in my laptop. I was AMAZED to find that it locked right up to someone else's network immediately! I was able to browse the web, and even look at their shared files. This was true on channel after channel on the card. I can only imagine how it must be even worse in an industrial area. Now I know why my 2 Ghz spread spectrum phone has such poor range.

Wireless in trouble? (3, Interesting)

Anonym1ty (534715) | more than 12 years ago | (#4229965)

With all this on war driving and hacking into networks for fun or foul, we better start being careful of what we say and how we act. (be nice)

We should realize that right now we have a great oppertunity to use wireless.

If admins continue to leave networks that need to be secure open to the public they are going to get hacked -in one form or another, maybe just harmlessly syphoning bandwidth, maybe stealing private information - but something is going to happen regardless.

What I fear hear is government regulation. Right now it is the resposibility of the admin who sets up this network to make sure it is reasonably secure. If wireless hacking becomes enough of a problem, governments will be compelled to regulate wireless networks. Sure some regulation may even be good, but from my perspective what is more likely to happen is it will be regulated to death.

Whenever we are forced to regulate we get these types of results: People who want to use wireless won't be able to comply with impossible for the little guy to comply with standards - experimentation dies, soon so does innovation.

Why should admins secure their network when they can rely on a government wireless police force to go around picking up the kiddies breaking into their network? Sounds stupid? that's right it sure is, but crap like this could very well happen. -We're allowed to remail lazy.

I have a wireless lan and it's reasonably secure... It isn't hack proof - nothing is. but it is encrypted and secured and stuff and also it is on it's own network, not directly tied into my wired lan... plus there isn't information on the wireless that could be considered "secret" or personal. I want the thing to work around the house for getting that there interweb. The access point is in the basement -- a simple thing, limits the coverage of the unit a lot - just the house and parts of the yard.

I'm still looking at other ways to secure it. I found a good one the other day SHUT IT OFF WHEN NOT IN USE. (who'd a thunk it?) Why can't businesses figure this one out?? put the power cord to the thing on a timer!! not business hours? no wireless!

Richmond and Spadina? (1)

checkyoulater (246565) | more than 12 years ago | (#4230148)

I want to know who is using all those Wireless Networks all along Richmond near Spadina. I thought that was towards the end of the Club District.
Even along Queen West, for that matter. Last I checked Queen West was a bunch of trendy clothing stores and used cd shops. Of course, I can't forget about Active Surplus, the best damn store in Toronto.

Am I missing something here?
Load More Comments
Slashdot Login

Need an Account?

Forgot your password?