Posts Tagged ‘wifi’

Gatwick Airport ‘free’ wifi scam

October 6, 2014

Gatwick Airport used to charge for wifi access, now they provide 45 minutes free.

Only problem is you do not get 45 minutes free, not if you do not use continuously.

Used for 10-15 minutes, then wifi turned off, to use remaining minutes later.

Only like a stationary taxi, clock is still ticking.

Try accessing, will not allow, even though 30 minutes showed remaining.

Several hours later, ‘free’ wifi minutes have expired and expected to pay.

A big fail by Gatwick Airport which they need to address.

Free wifi on the beach

October 6, 2014
free wifi on the beach

free wifi on the beach

Wifi is an important determining factor when choosing a holiday destination, something hotels that charge for wifi should take due note of, but free wifi on the beach?

Free wifi if you pay for a sun bed, otherwise a fee is charged.

Hotels that charge for wifi when you can get free wifi in any bar or coffee bar for the price of a drink are living on another planet. A sure sign of a failing hotel. Those that provide free but unreliable wifi and internet connection need to up their game if they are to remain competitive.

Waitrose: free coffee, wifi and newspapers

March 15, 2014
Waitrose free wifi

Waitrose free wifi

I was aware Waitrose was giving free coffee to its customers, but had no idea how you obtained the free coffee.

As I was leaving, I noticed a sign free wifi and a lady drinking coffee.

I walked out, then thought, why not, and walked back in.

A little shelf, two high seats.

I asked the lady how she got her free coffee? She pointed to a coffee machine and said help yourself.

The coffee was not great, but it was free free, and far better than the overpriced vile tasting coffee served by Costa.

The lady asked how it was, and said make the most of it, accept it with grace, the generosity of Waitrose, there is not much in life that is free.

She asked, did I buy a newspaper?

I said no, they were propaganda sheets.

She asked had I been shopping in Waitrose?

I said yes.

She asked how much had I spent?

I said a little over ten pounds, which was surprising as I had bought very little.

She asked, did I know that if I spent over five pounds, I could pick up a free newspaper?

News to me. Asked did I have a Waitrose card, did I park a car, anything bar, would I like a free newspaper?

I asked, how did she know, as I had seen nothing to say free newspapers.

I asked how did she know?

She said her sister had told her.

I then decided to make use of the free wifi whilst drinking my free coffee.

Google Nexus 7 found and tried to connect to 02, but had difficulty obtaining an IP address. Nothing was connected.

I tried Google Chrome. I was redirected to O2. I was asked for my mobile number, to send me a code, allegedly for security.

Nothing happened.

I tried Starbucks. Connected, but so slow as to be unusable.

I tried O2 again.

Same problem as before. Then I found I had missed a digit from telephone number. Once corrected, a code was indeed sent.

Now, I am asked to enter personal data. Aha, not free at all, a scam to collect personal data. The excuse, a legal requirement to know who is using the network.

Then, I noticed I was connected, messages were coming through.

I ignored the questions, and used the free wifi.

On leaving Waitrose and heading to The Barn for lunch, a noticeable drop in temperature, now quite cold.

No tenemos wifi

March 12, 2014
no tenemos wifi

no tenemos wifi

No tenemos wifi, hablen entre ustedes.

We do not have wifi, talk amongst yourselves.

Cappuccino and cookie at Harris + Hoole

February 7, 2014
cappuccino and cookie and Kobo Touch

cappuccino and cookie and Kobo Touch

I do not arrive until gone six o’clock, having spent most of the afternoon exchanging Kobo Touch at WHSmith, then installing software.

I try connecting Kobo Touch to Harris + Hoole wifi.

No problem, but accessing Kobo Store a waste of time.

I now see advantage of the kack-handed two stage download.

Use Kobo Store via laptop or computer to select e-book and transfer book to Kobo Library. Then, using Harris + Hoole wifi, download book to Kobo Touch.

Something to try another day.

Kobo Touch better than Kindle, has the BIG advantage of open source format for e-books, whereas Amazon Kindle is a propriety format.

Kobo Touch currently £30 in WHSmith (it was £90), the equivalent and inferior Kindle Touch is double the price.

I also recommend, download and install Calibre for e-book management.

WiFi Protected Setup Flaw Can Lead to Compromise of Router PINs

December 28, 2011

I’ve never trusted Wi-Fi Protected Setup. Just take the extra couple of minutes to create a nice, long gobbledygook password of your own and use that. And WPA2, of course. — Lauren Weinstein

The following was posted on Threat Post warning of a wifi security alert on wifi routers.

The US-CERT is warning about a vulnerability in the WiFi Protected Setup standard that reduces the number of attempts it would take an attacker to brute-force the PIN for a wireless router’s setup process. The flaw results in too much information about the PIN being returned to an attacker and makes the PIN quite weak, affecting the security of millions of WiFi routers and access points.

WPS is a method for setting up a new wireless router for a home network and it includes a way for users to set up the network via an external or internal registrar. In this method, the standard requires a PIN to be used during the setup phase. The PIN often is printed somewhere on the wireless router or access point. The vulnerability discovered in WPS makes that PIN highly susceptible to brute force attempts.

“When the PIN authentication fails the access point will send an EAP-NACK message back to the client. The EAP-NACK messages are sent in a way that an attacker is able to determine if the first half of the PIN is correct. Also, the last digit of the PIN is known because it is a checksum for the PIN. This design greatly reduces the number of attempts needed to brute force the PIN. The number of attempts goes from 108 to 104 + 103 which is 11,000 attempts in total,” the US-CERT advisory says.

“It has been reported that some wireless routers do not implement any kind of lock out policy for brute force attempts. This greatly reduces the time required to perform a successful brute force attack. It has also been reported that some wireless routers resulted in a denial-of-service condition because of the brute force attempt and required a reboot.”

Security researcher Stefan Viehbock discovered the vulnerability and reported it to US-CERT.The problem affects a number of vendors’ products, including D-Link, Netgear, Linksys and Buffalo. He said via email that he has received essentially no response from vendors about the problem.

“I noticed a few really bad design decisions which enable an efficient brute force attack, thus effectively breaking the security of pretty much all WPS-enabled Wi-Fi routers. As all of the of the more recent router models come with WPS enabled by default, this affects millions of devices worldwide,” Viehbock said in a blog post.

Viehbock has written a paper on the WPS vulnerability and his research and also developed a Python tool to brute-force the PINs. He hasn’t released the tool yet, but says he may do so once the code is in better shape. None of the affected vendors have released fixes or workarounds for the bug, but Viehbock says in his paper that disabling WPS looks to be the main practical mitigation, Implementing long lock-out times for multiple authentication failures would help as well.

“One authentication attempt usually took between 0.5 and 3 seconds to complete. It was observed that the calculation of the Diffie-Hellman Shared Key (needs to be done before generating M3) on the AP took a big part of the authentication time. This can be speeded up by choosing a very small DH Secret Number, thus generating a very small DH Public Key and making Shared Key calculation on the AP’s side easier.,” he says in the paper.

Posted by Dennis Fisher on Threat Post.

The wifi routers supplied by BT, for example, have on the back the name of the router and a seemingly random genererated long key of upper and lower case letters.