月曜日, 12月 31, 2007

Peace through Privacy




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=shsr

It does not require a majority to prevail, but rather an irate, tireless minority keen to set brush fires in people's minds. —Samuel Adams

"We really haven't done everything we could to protect our customers ... Our products just aren't engineered for security." Brian Valentine Senior Vice President of the Windows Division, 05/09/02

" There's no reason to treat software any differently from other products. Today Firestone can produce a tire with a single systemic flaw and they're liable, but Microsoft can produce an operating system with multiple systemic flaws discovered per week and not be liable. This makes no sense, and it's the primary reason security is so bad today. "
-- Bruce Schneier, Cryptogram, 16/04/2002.

火曜日, 12月 25, 2007

rfmonks flickr collection

木曜日, 12月 21, 2006

My new blog dedicated to my iBook

水曜日, 12月 20, 2006

Seattle Best in Baguio City PI


Location: SEATTLE'S BEST COFFEE
Location Type: Cafe / Restaurant
Address:
SM Baguio
Baguio City, Philippines

Phone: 63 7 44466465
this is the location also of a wifi hotspot. there are also others in baguio at
Burnham Hotel Lobby
Camp John Hay, Devco
CJH Eco-Trail Picnic Grounds
Figaro Coffee, Camp John Hay
Netopia
Starbucks Coffee
The Filling Station

月曜日, 12月 18, 2006

Learning about amateur radio 'ham'


while reading the 2007 arrl handbook, which I freely copied off the occompaning cd from the public library, I noticed that in fcc regulation part 97 station operation standards that it was prohibited to send "false signals, and ciphers" across the airwaves [97.113b] being that this is the paraphrased version and not the original document I can't tell any other details. this perked my interrest in finding out exactly how the government can dictate such a rule when they clearly use transmitted ciphers on a daily basis. I wonder if ham transmissions in the ISM band have to comply with that rule? This is some interresting reading and I plan to get deeper into FCC documentation when I get my next break from work. Seemingly in contradiction a paragraph latter it says RTTY and data (using a specified digital code) may be used when all or part of the communication are transmitted using such an emission.

I personaly become interested in RF through 802.11 protocol but the more I read in this book, I am totally amazed how cool ham is and how little I know. so if you came to this site seeking solid RF discussion, bare with me as I embark on the quest for understanding most of this stuff. I think this summer I am going to look into meeting a lug for Ham enthusiasts and get my licence. Apparently you can get a Technicians licence with minimal effort.

A recent news article on their site said that the morse code requirement is being droped! Great time to get a licence.

I've included a mini glossary because a lot of these terms are new to me. [here]

Another really cool find on the arrl web site was this thing hams do called qsl, where in previous generations hams around the world would exchange these cards proving there communication and receiving awards for stacking up numerous contacts around the world. Now, apparently you can download trusted qsl. which, I might add, uses PKI encryption! I'm finding that these ham people are right up my alleyway of interrests.

金曜日, 12月 15, 2006

Useful site for Mac users

A friend pointed me to the site when I was looking for more information on accessing the 'airport' from the comand line. I found this useful for printing your access point
$ system_profiler SPAirPortDataType | awk -F": " '/Current Wireless Network/{print $2}'
or even for locating airport stuff try
$ locate / | grep "/airport$"
I noticed that the iwconfig stuff of linux didn't work, but of coarse BSD use ifconfig. I will try to keep putting usefull information concerning macs and wireless here on my blog, mostly because I want to be able to find these things again. macosxhints is a valuable site. If you no of any other please leave a comment. I'm currently interrested in PPC assembler links and 802.11 mac related links. Kismac has been fun to play with, however I would like to start using packet injection, and need to get that sorted out.

another interresting thing I found out was the post I left earlier about crypto and SSH
$ ssh-keygen -t rsa should be $ sshkeygen -t rsa on a mac
and ssh-copy-id didn't seem to work in OSX. probably a trivial tweak needs to be done in syntax.

cheers, merry Christmas all

月曜日, 12月 11, 2006

snippet from the code book by simon singh

Alice must create a public-key, which she would then publish so that Bob (and everyone else) can use it to encrypt messages to her. Because the public-key is a one way function, it must be virtually impossible for anybody to reverse it and decrypt Alice's messages.

However, Alice needs to decrypt the messages being sent to her. She must therefore have a private-key, some special piece of information which allows her to reverse the effect of the public-key. Therefore Alice (and Alice alone) has the power to decrypt any message sent to her.

I'm on page 274, and I would recommend this book for anyone that is curious about crypto history.
I'm also halfway through Bill Clinton's autobiography, not sure if I want to spend my precious free time finishing that book, although it does give some unique insights to the wheels of politics.

土曜日, 12月 02, 2006

Dear Santa, click here!



2.33GHz Intel Core 2 Duo
3GB 667 DDR2 SDRAM - 1x2GB, 1x1GB
160GB Serial ATA Drive @ 5400 rpm
SuperDrive 6x (DVD+R DL/DVD±RW/CD-RW)
MacBook Pro 15-inch Widescreen Display
Backlit Keyboard/Mac OS - U.S. English
iWork '06 preinstalled
Accessory Kit

水曜日, 11月 29, 2006

crypto notes

To use cryptographic authentication, you must first generate a key pair for yourself, consisting of a private key (your digital identity that sits on the client machine) and a public key (that sits on the server machine). To do this, use the ssh-keygen program to produce either a DSA or RSA key. The OpenSSH version of ssh-keygen requires you to specify the key type with the -t option (there is no default):

$ ssh-keygen -t rsa
Generating public/private dsa key pair.
Enter file in which to save the key (/home/rfmonk/.ssh/id_rsa): press ENTER
Enter passphrase (empty for no passphrase): thanks2thebookbyoreillyonSSH
Enter same passphrase again: yadayadayada....
Your identification has been saved in /home/rfmonk/.ssh/id_rsa.
Your public key has been saved in /home/rfmonk/.ssh/id_rsa.pub.
The key fingerprint is:
13:ba:05:87:a7:87:ad:26:b4:ce:54:84:bc:61:39:17

Normally, ssh-keygen performs all necessary mathematics to generate a key, but on some operating systems you might be asked to assist it. Key generation requires some random numbers, and if your os doesn't supply a random-number generator, you may be asked to type some random text or wiggle your mouse around. ssh-keygen uses the timings of your keystrokes to initialize its internal random-number generator.

After creating the key pair on the local host, you must install your public key
in your account on the remote host. A remote account may have many public keys installed for
accessing it in various ways.

Create or edit the remote file ~/.ssh/authorized_keys and append your public key—i.e., the contents of the id_dsa.pub file you generated on the local machine. A typical authorized_keys file contains a list of public-key data, one key per line.

OpenSSH includes a program, ssh-copy-id, that installs a public key automatically on a remote server with a single command, placing it into ~/.ssh/authorized_keys:

ssh-copy-id -i key_file [user@]server_name
For example, to install the key mykey in the rfmonk account on orion.extremeboredom.net:

$ ssh-copy-id -i mykey rfmonk@orion.extremeboredom.net

You don't need to list the .pub extension of the key file; or more specifically, you can provide either the private or public-key file, and the public key is copied to the remote server. In order for the copy to take place, you'll need an account on the remote machine, and you'll need to authenticate somehow. If you've never set up public-key authentication on server.example.com before, you'll be prompted for your login password. ssh-copy-id is convenient, but it has some subtle issues: If you have no authorized_keys file on the remote machine, ssh-copy-id creates one containing your new key; otherwise, it appends the new key. If you do already have a remote authorized_keys file, and it does not end with a newline character, ssh-copy-id blindly
appends your new key onto the last public key in the file, with no newline between them. This effectively corrupts the last two keys in authorized_keys. Moral: always make sure authorized_keys ends with a newline. (This is easy to overlook, especially when running OpenSSH on Winblows. The syntax of ssh-copy-id is similar to that of scp, the secure copy program, but there's an important difference: scp follows the hostname of the remote machine with a colon. Don't use a colon with ssh-copy-id or you'll get an error message, "Name or service not known," as the hostname lookup fails.

Regardless of which SSH implementation you use, make sure your remote SSH directory and
associated files are writable only by your account
# OpenSSH
$ chmod 755 ~/.ssh
$ chmod 644 ~/.ssh/authorized_keys

Public-key authentication is more secure than password authentication because: It requires two secret components—the identity file on disk, and the passphrase in your head—so both must be captured in order for an adversary to access your account. Password authentication requires only one component, the password, which might be easier to steal. Neither the passphrase nor the key is sent to the remote host, just the authenticator discussed earlier. Therefore, no secret information is transmitted off the client machine. Machine-generated cryptographic keys are infeasible to guess. Human-generated passwords are routinely cracked by a dictionary attack. A dictionary attack may be mounted on the passphrase as well, but this requires stealing the private-key file first. A host's security can be greatly increased by disabling password authentication altogether and permitting only SSH connections by key.

土曜日, 11月 18, 2006

Wintering in the Aluetian Islands

Well, 100 days at sea isn't a very good way to stay abreast of tech trends, or sharpening hacking skills, but it is a good way to pay for nice things, and to stay current on child support. I can only hope that its my daughter that is benefiting and not her mother or her boyfriend. The day is soon coming where I will be getting Rebecca for summer if she wants a change of scenery. So this has the requirement of an attorney, stable address, and reliable vehicle. All of these things I'm accomplishing.

I will be watching the fishing vessel through Christmas, attending mass at a Russian Orthodox church. After Christmas we will be preparing for the most challenging part of the fishing year. "A" season, it is usually the best time to catch fish, however its bitterly cold. After the A season we fish in the gulf for cod, halibut, and black cod. I don't anticipate being home until June on 2007.

月曜日, 8月 14, 2006

I'm in Alaska Working

For those that keep emailing me wondering why I have not responded to their email, it's because I'm working on a boat in the bearing sea and can not get access to my email for long periods of time. Hopefully they will find their way eventually here and scroll down a little and then you will know. see everyone in November. latter.

金曜日, 8月 04, 2006

Once again, I embark on a voyage to the northland seeking plunder. The viking roots are deep in my heart I guess, But I tell myself that I cannot afford to go broke hoping something better will turn up. My bags lay packed by the door of my appartment, thankfully I didn't throw away my gear. I have made every excuse to leave at the last possible moment without raising any alarms. Ive paid my dues, and I'm not in a hurry to do busy work for free before we even leave Seattle. Its a lonely cold feeling I have in my heart, and it feels like a heavy stone is lodged inside of me, but I'm no rookie to isolation and lonliness, and I know that in time this feeling will pass. I pray to God above for strength, so many things stand in the way of achieving my goal. Always present is the fear of injury, which would result in the loss of money, or at best finishing the season in great pain.

I have closed my screen sessions on #neg9 (IRC,silc) and turned off jabber on my gmail account. In the final moments before I go, I am scrambling to get all the loose ends tied up, payment arrangments covered, and errata downloaded to my box (i'll be without internet).

Mom hopefully you find this post and know now that I didn't disappear altogether, keep me in your prayers. I'm on the F/V Kjevolja (don't try to pronounce that, just say KJ, it's actually not even a word but a conglomeration of the owners names. I thought for the longest it was Russian--wrong).

If everything goes well, and I come home alive, expect to see me around the end of November

木曜日, 8月 03, 2006

August 03, 2006 Hackers Clone RFID Passports

Farewell Seattle, maybe see you around Christmas



So after a great evening with Seattle Wireless, as usuall some of us will hunt up a place to eat. I had already ate, so settled for a couple gin martinis and some great intellectual stimulation about changing the world. Afterward, as we conversed on the sidewalk (broadway, on cap hill) this man (above in the picture)
came up to us and asked if he could play us a song, well, if you lived up here you'd understand, that our initial reaction was 'not interrested, we got no money, get lost', etc--(well not get lost). But your basic callus responce to the perfectly able bodied panhandlers looking for drug/booze money. He told us it would cost us nothing and probably be the best song we would ever hear, Matt, and I both told him that we would like to hear his song but we were broke. 'No problem', says he. Setting down his guitar case and pulling out a well used instrument he begins singing about peace and harmony, with a terrific voice and a lot of passion. (It's good to be here in Seattle, I'll miss you when I'm gone). Chris and I gave him what we could both afford, welcomed him to Seattle, and thanked him for the song. I hope he goes far. He is making a change with the instrument God gave him. I can't sing, but someday I hope to use a computer to make changes too.

Read more about this brother of peace on his web site here.

Friday, I leave for the Bearing sea once again on the KJ (F/V kjevoya). I hope to make my dreams come true, or at least survive another fishing season, and hopefully not forget everything I worked to learn.

Peace!

土曜日, 7月 29, 2006


Well, no point whining, I didn't get the speakeasy job. fatal error was truth (6yr old misdemeanor). And that's the way the cookie crumbles, looks like a recurring patern. If you've had any trouble in the past, no matter how slight, lie-or-say-bye bye. So instead of making a big thesus on injustice and a foobared system, I intend to just get on with life. (Yes, Mom I was very disappointed-hopefully you did not tell the whole world, but if you did, just point them here.)

So yesterday, I reinstalled Ubuntu (haha) dapper, screw windows, I just can't take putty anymore, I'm not smart or patient enough to get the ssh client working in cygwin. And FreeBSD, well, someday I'll mess with that some more. I guess I should just stick to one thing, but I have fun checking everything out. I installed gnome-art which gives you more wallpapers and schemes to choose from, then fR (eric) gave me a better font for programming. ProggyCleanTT CE.


~Todays fovorite web finds~
Voting machine whistle blower
Schneier; the comments were better than the article.
Invisibility Cloaks? UK news article on current research.

木曜日, 7月 27, 2006

2nd interview tomarrow

I can't help but be estatic about tomorrows interview with speakeasy. Part of my excitement stems from the fact that speakeasy is a premier VoIP provider, and ISP (based here in Seattle). The main reason is Im stoked about working finally in IT, because theres no better way to learn tech than to have to do it everyday.

My friend Eric sent me some green links tonight. Rubber sidewalks (showering together to save water) , electric cars, and A good link to listen to a rebuttal about naysayers of the global warming issue.

火曜日, 7月 25, 2006

OSCON








So I arived in Portland today about noon, went and got something to eat then checked into the Convention center Inn; One of the last decent rooms in the vicinity (minus microwave and most amenities, came to $100). After a short nap, I went to the convention center to look for swag, not having registered, I was lucky to get an OSCON bag.

The wireless here works great, however, the initial attempt to log into a shell failed. I was able to ping the Internet, but I wasn't about to log into anything without an encrypted shell. spoofing my mac address (sudo ifconfig eth0 hw ether xx:xx:xx:xx) I was instantly able to log into dedication--hmm.

At 7:30 pm Larry Wall started the awards. Damien Conway, was supposed to get on stage at 8:30, but some blonde with a big rack just keeps going on and on about nothing in particular, so I decide to run up for some fast food, getting back only to find I missed half of Damien's talk.

I listened to several other speach and question events in the portland ballroom of the convention center. At 10:30 on wednesday I excitedly rushed to the expo to find out only the 'registered guests could get in' so much for open source. Ah well, always next year. and maybe my employer will pay for it then. The hotel room had some issues by the way, their wireless turned out to be non-existant, the bathroom fan didn't work, there was no microwave, shuttle, or continental breakfast. (I was reminded why I used to bring my own towels, soap, shampoo, pillow, etc when I traveled. I didn't and I regreted it)

火曜日, 7月 18, 2006

An inconvenient truth

Results 1 - 100 of about 24,400,000 for An inconvenient truth. (0.16 seconds)

Thats a lot of search results, even if you 'x' out the colisions, unrelated, and unwanted. What I find trajic, is that there are many people who will not see this movie because of an opinion on Al Gore.

I admit to scoffing openly when I first heard about this, the responce I got from a friend this morning when I suggested that she must see this movie. Her reply, "I don't watch propoganda." (only the CNN, I thought but didn't retort).

What was the reason of my about face? Did Stu fall victim to propaganda? How about the possibility that what I saw was so moving that I feel this is probably the most important film you'll ever see.

Politics aside, or maybe not; maybe politics is exactly what we need to get some results now before its to late.

Now at this point, I can hear my protestant brother and father in my mind retorting something to the effect, Jesus is comming, theres nothing you can do but put your head in the sand and waite it out. This is the typical american church viewpoint, after all we are fighting "terrorists" and we can't be bothered with the clear evidence we're causing our own imminent disaster because of total greed.

I believe in God, and I propose this; If you believe God created the world, do you think he wants us to stand by and do nothing while people destroy it?

O.K., I have friends who are also aethiests or agnostics, and the question is still valid in that when the earth is gone, buddy we are all screwed whether you believe in God or not.

In clossing this post, I just want to summarize the movie. A straight forward, laying down of facts by scientists from every country on earth, all of which are unanimously undivided in their opinion that if there is not significant change NOW, we are headed for some serious problems--Very Soon. This coupled by strong statistics, visual proof, and overwhelming imperical evidence that theres big problems on the 'radar'.

Get your head out of the sand and do something before its to late.

月曜日, 7月 17, 2006

We have met the enemy

"We have met the enemy and he is us."
Walt Kelly

Last Post I listed a few of the issues that I wanted to work on with both XP and Ubuntu.
Starting with XP, I found that you could remove the default name on the login screen (last users’ name) by changing a key in the registry.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion
Winlogon

Then you want to look for DontDisplayLastUserName, however, on my Sony Vaio (VGN-T350P) I couldn’t find this at that location. I did find DefaultUserName, and AltDefaultUserName, which I erased (deleted), while I was there I modified my domain name and alt domain name. I logged out, and logged back in, finding that it apparently worked. Upon looking at the same registry keys I noticed to my dismay that they had returned to there original state. So I will now start hunting for the file or files where logon reads. Maybe it’s a service, maybe it’s another reg key. Someone is going to know.

I did find on the Ubuntu issue (where is Kismet, etc) that I had indeed checked all the repositories in synaptic, but had forgotten to update the package manager. This allowed me to find all the apps that I was hunting for, with the exception of Pine. I guess that will have to be built from scratch.

I started a FreeBSD 6.1 in MS Virtual PC, which so far has worked pretty decent. You can run an install from an ISO image simply by booting the Virtual machine then selecting CD in the tool bar and then selecting capture ISO or dragging and dropping the ISO.

So, as usual, I have more projects starting then I ever get done. This is a fun way for me to learn, however, it is very unproductive and I recommend focusing on a few projects like some of my friends do—they have proven to be far more productive with that approach.

Seattle weather has been great lately, and I am noticing many of those cool little fuel efficient motor scooters zipping around the U. I talked to a lady that jumped off one in front of the Apple store yesterday while I was enjoying scenery and bandwidth. She said that it was $1200.00 new, had a 1 gallon gas tank, got great mileage, was easy to park, didn’t require a license or insurance to operate, and was totally street legal. She did say however, that if you are going to have a passenger, make sure you get the passenger model or you will get a ticket. Also she pointed out that they are not a lot of fun in the rain.

I don’t see petrol fuel getting any less expensive with all the current problems in the middle-east, and I am strongly considering purchasing one of these when I get back to work. I don’t give a ‘hoot’ what the GSXR crowd thinks of these bikes, or the Harley crowd, this has got to be the most economic way to go, fortunately there is also a great bus system here for when it rains.

火曜日, 7月 11, 2006

Day in the life of a bum

Well,
current issues on windows OS
- cygwin installed, but cant seem to get ssh to work (read docs on todo list)
- need to research how to use the ctrl+alt+delete authentication, without being a member of a domain.
- need to find out how to disable username showing automatically in authentication log-on screen
- would like to figure out how to make FBSD6.1 do a network install in virtual pc over a wireless card. but make it think its comming from an ethernet connection. I imagine understanding NAT will help me here.
current issues on Ubuntu Dapper
- what repositories are needed to get kismet, tcpdump, curl, pine, ethereal, ncat, and if theres an apt package for bluesnarf.
- get the necessary stuff for all the movie file formats that are restricted.


Matt, from Seattle Wireless was generous enough to pass my resume on to Speakeasy, and they were generous enough to explain that my resume was only a cover letter, and that I needed more meat.

I'm reading about a half dozen books at the moment, one of which is not a technical book. It is Robert Jordans classic "The Eye of the World". I wasn't convinced with the jacket flap that it was anything but ordinary (with the exception that Jordan has a phenomanal gift with building believable characters) until the trollocs kicked in Tams door. OMG, I was supposed to go to sleep and get up early, but read the next 100 pages without break. Incredible, if you are into this genre and you haven't read this book, I recommend it highly recommend it.

水曜日, 7月 05, 2006

Please take my picture off the milk carton!

Well, even though there's probably nothing interresting to report in my life, it's time to update;Friends might wonder why I have been absent so much lately, and I want to assure everyone that I'm still very interrested in wireless, computers, etc., however life has been pretty hectic the last several months, and there hasn't been a lot of time to study.After a failed repartition of my dapper OS, which fried everything (no back up B) I installed the evil windoze OS, with the intentions of latter sharing this with Ubuntu. I, will be using this windows partition to brush up on the OS, as well as use some navigation software that only runs on MS.I truly hope to convert to a macbook at some point in the future. In the meantime I can always run one of the many live distros, like Knoppix, or Auditor, or Anonym OS (OpenBSD).Unfortunately I missed GSLUG this month, which I am very much interrested in staying involved with. There's the distinct possibility that my next job will make it nearly impossible to attend Seattle Wireless, or GSLUG, due to the constant traveling I will be required to do.While using windoze, I thought I would also look at Visual Studio, and Visio. So far I haven't been able to find the time.I'm planning a trip out of the country, and have applied for a passport which should be comming any day now. I'm very excited about that, however I still need to get to work to put togethere some travel money.Ive also been reading a little of history, for a change (my entire book library is IT) on wikipedia, a truly remarkable source of information.Mom, if you read this--sorry for not writing sooner, I will find time before to long, thanks for the pictures, and I hope your move works out ok.

金曜日, 6月 16, 2006

..: turn off the tv :..

I would turn on the TV
but it's so embarrassing
to see all the other people
I don't know what they mean
and it was magic at first
when they spoke without sound
but now this world is gonna hurt
you better turn that thing down
Turn it around

Well it wasn't me says the boy with the gun
sure i pulled the trigger but it needed to be done
because life's been killin' me ever since it begun
you cant blame me cause i'm too young

You cant blame me, sure the killer was my son
but I didn't teach him to pull the trigger of the gun
It's the killing on his TV screen
You can't blame me, it's those images he sees

Well, You can't blame me says the media man
Well I wasn't the one that came up with the plan
and I just point my camera what the people wanna see
man it's a two way mirror and you can't blame me

You can't blame me says the singer of the song
or the maker of the movie which he based his life on
It's only entertainment and as anyone can see
it's smoke machines and make-up, man, you can't fool me

It was you
it was me
it was every man
We all got the blood on our hands
we only receive what we demand
And if we want hell then hell is what well have

And I would turn on the TV
but it's so embarrassing
to see all the other people
don't even know what they mean
and it was magic at first
but let every one down
Now this world is gonna hurt
You better turn it around
turn it around

--Jack Johnson

日曜日, 5月 14, 2006

Happy Mothersday Mom


I can see the joy in your face Mom, from holding a newborn. Did you smile like that for me 38 years ago in the naval hospital in Japan? Im sure you did. Thanks for putting up with all the crap I put you through, all the grey hairs I gave you.
thanks for showing me how to love and forgive people.

Wishing you many, many more mothers days, I hope all the rest of your long life, that each day is a mothers day.

金曜日, 5月 12, 2006

Ever heard of hardware hacking your worthless version5 wrt?



I wanted to get the diagram on my site in case this disapeared. The guy claimed he had success with his method, so Im definately going to give this a whorl, possible a hacknight project. No need to worry if my warrenty gets voided, because the things fried like burn't toast anyway. 'Widge' gave me the idea and pointed me to the site, id never heard of a Jtag cable, or unbricking your WRT, guess reading 20 hours a day isn't enough. =) . What I need to find out is if this can be done on a Linux box.

download these 3 files...
DD-WRT micro generic
CFE.BIN
HairyDairyMaid WRT Debrick Utility v45.
---------------------------------------------------------------------------
Nokia N93 made it past the FCC (federal criminal corporation). Ive been up on this phone since I seen it in a magazine last year, its worth looking at. [...]

Bruce Schneier on TSA's security free zone [...]

Company converts Hydrogen from corn syrup without the ethanol step. [...]

Serious overclock 7.104GHz [...]

Im still trying to figure out how to make this traceroute V useful for more than a novelty. putting a google map behind it was a stellar idea.


木曜日, 5月 11, 2006

Major Vulnerability Found in Diebold Election Machines



yikes! (thanks dyn.)

Virgin Vendetta!



Im looking into the possibility of opening a class action lawsuit against virgin mobile. recently a phone malfunctioned, the phone contained $40+ in credit. I purchased another phone because the broken one was not under warrenty. I called Virgin mobile and explained the situation. The representative suggessded that i purchase time for the new phone, then disable the old one and transfer the money. I proceded to follow her advice by purchasing the time for the new phone. However, i needed to have to wait until i had the person who actually purchased the first phone (father) present. This second step occurred the following day.


I was told by the representative that they could disable the phone but not transfer my money, because policy had changed overnight. Finding this incredoulus, and ridicoulus, I escalated this to the representatives supervisor.

I asked permission to record the conversation, "Danny" refused, and told me that there was no way to track the conversation, no ID of the call, also he couldn't reviel his last name. He basically stated the same thing, that I was basically going to lose the money.

I escalated to his supervisor "Arron" who refused to accept the call be recorded, and declined to help me, saying that the company policy was changed overnight, but he also said that this was written in terms and agreement, apparently not seeing the contradiction he just made. He referred me to his legal department.

during the conversation with all three levels of escalation, I was put on hold for around an hour.

I would like to collect similar stories, and recieve legal advice on how to proceed with sueing this company. How many other people that bought track phones (pay as you go) because they couldn't afford a contract have been getting screwed out of money. $20-40 isn't a lot to these corporations, but its a lot to the small guy like you or me. Help me defeat this kind of trickery, Lets make these bastards pay!

would love to here from an attorney with resonable quotes on pursuing this matter as well.

From The office (crypto for dummies)



Rob Flickenger pointed to the usefull tool monoligual, which will strip unnessary languages out of a Mac, freeing up 2GB space, he pointed out to make sure and uncheck english. =) sage advice, thanks Rob.

RFID enthusiasts wont want to miss Bruce's latest post about rfid hacking. Not to mention the trackback pings which im starting to get addicted to as well.

Couldn't make it to E3? Want to see Super MArio world? no? well its an interresting showcase of technology nonetheless. Thank you youtube. [...]

AT&T is offering broadband sattelite to its rural customers, cool [...]

Slashdot had an article about the NSA recording all US phonecall records, believe it or not Qwest didn't comply. (for how long though) [...] I'm not terribly suprised, only documenting our ever disappearing freedom. boom.

水曜日, 5月 10, 2006

Some family pictures, (M-day tribute)







nice spiffy shirt G. haha, (back 'in the day'). My cat scrapper, was part bobcat- er the product of a siamese rapped by a wild cat with long hair from ears in norcal. I dont remember wearing clothes like that (pic 2), or dont want to remember. heh. Moms Boyfriend John in his greenhouse. he's a canadian, maybe that guy thats on IRC. and my 'moms' on the bottom picture, You still look good Mom. Happy mothersday.

火曜日, 5月 09, 2006

My brother and his 'lab' =)

月曜日, 5月 08, 2006


Some ASCII fun

| \ | |           |  _  |
| \| | ___ __ _ | |_| |
| . ` |/ _ \/ _` |\____ |
| |\ | __/ (_| |.___/ /
\_| \_/\___|\__, |\____/
__/ |
|___/
 _____           
/ ___|
\ `--. ___ ___
`--. \/ _ \/ __|
/\__/ / __/ (__
\____/ \___|\___|

,
dM
MMr
4MMML .
MMMMM. xf
. "M6MMM .MM-
Mh.. +MM5MMM .MMMM
.MMM. .MMMMML. MMMMMh
)MMMh. MM5MMM MMMMMMM
3MMMMx. 'MMM3MMf xnMMMMMM"
'*MMMMM MMMMMM. nMMMMMMP"
*MMMMMx "MMM5M\ .MMMMMMM=
*MMMMMh "MMMMM" JMMMMMMP
MMMMMM GMMMM. dMMMMMM .
MMMMMM "MMMM .MMMMM( .nnMP"
.. *MMMMx MMM" dMMMM" .nnMMMMM*
"MMn... 'MMMMr 'MM MMM" .nMMMMMMM*"
"4MMMMnn.. *MMM MM MMP" .dMMMMMMM""
^MMMMMMMMx. *ML "M .M* .MMMMMM**"
*PMMMMMMhn. *x > M .MMMM**""
""**MMMMhx/.h/ .=*"
.3P"%....
[nosig] nP" "*MMnx

(thanks to the artist whoever he/she is)



                

Jesus was a hacker



Having to stand up for a belief in God these days is increasingly difficult due to many factors that are justifiable and unfortunate. It is ironic that there are like minded people as me that believe in freedom, however are unwilling to accept that a religious belief is an acceptable extension of that freedom, and would slander or deny those that have a differing viewpoint without qualifying there argument, blindly accepting that Fanatical right wing fascists, calling themselves christians, are able to speak on behalf of God.

I am personally vehemently against the current paradigm of fascism, and the use of religion to further these goals. On those grounds, I despise most claims of christianity. Many, many examples exist, that destroy the good teachings of Christ. From the obvious i.e. televangelism marketing schemes, from the not so obvious, i.e. polotics from the pulpit clothed as Gods word but deceptively conveing poison.

Be reminded that the words of Christ were based on Love, and he said again and again, in action, in parable, to love your nieghbor. He didnt say to make a big marketing scheme to profit off religion, as a matter of fact, he was bruttaly tortured and murdered for standing up against that very establishment.

Dedication. Jesus was a hacker...

whenever he was presented with an impossible problem, be it lack of wine at a party, feeding huge crowds, diplomacy, survelience, dissemination of information, he never backed away from the task. Whether or not you chose to believe in miracles, lets say for instance you dont, the fact that a public record of a person lasting 2000 years should lend credibility that he was someone who thought outside the box. The stories they chose to relay about his life, showed him hanging out with criminals, political activists, hookers, disenters, excomunicates, outlaws, thieves, and law abiding people as well.

Being Catholic doesnt mean I have to agree with everyone else that is Catholic. St Francis of Asisi, as well as Mother Terresa both are great examples of the kind of people that lived out there lives in the spirit of charity, not exploitation.

---------------------------------------------------------------------------

Who Links to me? (handy little tool)

                     .ed"""" """$$$$be.                     
-" ^""**$$$e.
." '$$$c
/ "4$$b
d 3 $$$$
$ * .$$$$$$
.$ ^c $$$$$e$$$$$$$$.
d$L 4. 4$$$$$$$$$$$$$$b
$$$$b ^ceeeee. 4$$ECL.F*$$$$$$$
e$""=. $$$$P d$$$$F $ $$$$$$$$$- $$$$$$
z$$b. ^c 3$$$F "$$$$b $"$$$$$$$ $$$$*" .=""$c
4$$$$L \ $$P" "$$b .$ $$$$$...e$$ .= e$$$.
^*$$$$$c %.. *c .. $$ 3$$$$$$$$$$eF zP d$$$$$
"**$$$ec "\ %ce"" $$$ $$$$$$$$$$* .r" =$$$$P""
"*$b. "c *$e. *** d$$$$$"L$$ .d" e$$***"
^*$$c ^$c $$$ 4J$$$$$% $$$ .e*".eeP"
"$$$$$$"'$=e....$*$$**$cz$$" "..d$*"
"*$$$ *=%4.$ L L$ P3$$$F $$$P"
"$ "%*ebJLzb$e$$$$$b $P"
%.. 4$$$$$$$$$$ "
$$$e z$$$$$$$$$$%
"*$c "$$$$$$$P"
."""*$$$$$$$$bc
.-" .$***$$$"""*e.
.-" .e$" "*$c ^*b.
.=*"""" .e$*" "*bc "*$e..
.$" .z*" ^*$e. "*****e.
$$ee$c .d" "*$. 3.
^*$E")$..$" * .ee==d%
$.d$$$* * J$$$e*
""""" "$$$" Gilo95'

The computer smarts of Ron Deibert, Nart Villeneuve, and Michael Hull, combined with their passion for politics and free expression, have led them to develop a highly anticipated software program that allows Internet users inside China and other countries, such as Iran, Saudi Arabia and Burma, to get around repressive censorship and not get caught.Their innovation is called Psiphon, and it's being launched at the end of this month. "It's enormous," says Deibert, 41, a nerd-meets-aging-punker kind of guy who directs the Citizen Lab at the U of T's Munk Centre for International Studies, where the trio work. "If it works the way we hope it does and is distributed worldwide, it will have a huge impact on freedom of speech."Others watching Psiphon's progress agree. "We've been trying to circumvent both the firewalls and the censorship surveillance," says Sharon Hom, executive director of New York-based Human Rights in China. "So it's something we are very, very interested in."Psiphon takes the concept of a third-party computer doing the work yours can't because of censorship, and protects it by relying on trusted friends and close family, to create a program the creators say is nearly fail-safe. [...]

BUFFALO, N.Y. -- When trying to lie your way through any situation, keep a tight rein on your zygo maticus major and your orbicularis oculi. They'll give you away faster than a snitch.

So says social psychologist Mark Frank, whose revolutionary research on human facial expressions in situations of high stakes deception debunks myths that have permeated police and security training for decades. His work has come to be recognized by security officials in the U.S. and abroad as very useful tool in the identification and interrogation of terrorism suspects.

By applying computer technology to the emotion-driven nature of nonverbal communication, Frank, a professor of communication in the School of Informatics at the University at Buffalo, has devised methods to recognize and accurately read the conscious and unconscious behavioral cues that suggest deceit. [...]

Devicescape has partnered with wireless and wireline switch and router specialist LVL7 on Linux-based "wireless LAN switch" software expected to ship this quarter. LVL7's FastPath Wireless LAN stack leverages Devicescape's Wireless Infrastructure Platform (WIP) to support a variety of intelligent wireless network capabilities useful in enterprise environments, the companies say.

According to Devicescape, "wireless LAN switches" are switches that, when used to aggregate traffic from multiple wireless access points (APs), can make intelligent decisions about which AP a mobile device should connect to, based on signal strength and AP load. Additionally, wireless LAN switches support seamless handover between APs, useful for voice-over-WiFi phones, for example, or for carrying a laptop between an office and a conference room across the building. [...]

'hacker' uses a $25 dollar device (article doesn't say) to change the Toronto transit message system boards to voice political views against prime minister. The article calls him a hacker, the opinion feedback debates the use of the word. I thought it was both funny, and if used to voice a decenting political viewpoint I salute him for his ingenuity, and balls. Hactivism in action. [...]

Cisco Security Advisory: Cisco Unity Express Expired Password Reset Privilege Escalation.[...]

Linus Torvalds comments on Linux Kernel overhall [...]

Schnier as usual, kicks ass. heres a couple links of recent interrest
[assult weapon] [who owns your box?]

FCC is officially allowed to sniff all VoIP traffic [...]
----------------------------------------------------------------------------------------------

土曜日, 5月 06, 2006

40MHz MIMO, 80211n




I went garage sale shopping briefly today with a friend, this is what I found:
1apple macintosh minitower (not so mini) 266 MHZ processor 32M SDRAM,
floppy 9G UW hard drive, CD, ZIP, 512K cache, 6M SGRAM, AV (not sure what that is, wikipedia tells me that AV may mean:

may mean:Adult video,AltaVista,Alterac_Valley, Alternative Vote, Angela_Via, Anguilla, Antelope Valley, Anti-virus, Artificial_vagina, Audio-visual, Authorised Version, Avatar (virtual reality), Avenue, Average, Avianca, IATA, Arcade Volleyball, Approval voting, a month in the Hebrew calendar, attovolt, Avar language)

wew =) guess ill find out about that one. Anywho... all that for the price of a cup of Grande Vanilla latte, soy no foam+tip ($5).

I got a KVM switch with two ports, but needs a 9v power adaptor. and possible a second set of wires (i might have that here already). $1

A book case, for free, A 486 WB-U1 main board, $1

So for $7.00, I had a good morning and more crap to play with.
----------------------------------------------

Last night was the 2600 meet. fR and I got a ride with craSH and Jvoss to seattle were we picked up octal. Along the way Jvoss filled us in on his trip to Japan, while I asked him endless questions.

The convention center downtown where this group meets every month doesnt even like us meeting there, on top of that the bathrooms were locked up, the wireless was futile (pay per, and not enough traffic to find a working bootp packet off a ten minute tcpdump).

At any rate, Shinobi made it from elensburge, wish he didnt live so far, hes very excited about getting together to hack, unfortunately the 2600 scene here in seattle is not conducive to group projects, like Seattle Wireless or Neg9 is. Before you conclude that im bashing, dont, just merely pointing out the flavor of the two meetings Ive been to. cool people, but more of a scene environment that a learning place. (feel free to comment and call me an idiot, this is imho. But remember that there are a lot of free blogs out there, so start blogging and say whatever you like, be free...)

So Jvoss helped me with getting my prism II card configured correctly so it would run in monitor mode.

problem was ubuntu was recognizing it as a prism I lsmod showed orinoco_cs and hostap. J pointed out that even the prism I supported monitor.

steps I took to correct it were
lsmod
modprobe -r (module name, also remember that no 'r' loads the driver)
cardctl eject
pluged it back in
modprobe -r again...
iwconfig wlan0 mode monitor
ifconfig wlan0 (any IP address)
sudo tcpdump -i (interface) -w ~/Desktop/whereever.pcap

im going to put Win Server 2K3 (of coarse I paid full price for the enterprise edition licence) in VMware, downloaded the longterm trial version of solar wind (a $900 dollar utility for managing your cisco network) from there website at www.piratebay.org . Looking for an old cisco switch or router for less than $100 just so I can learn the IOS. then ill telnet from minicom into the switch or from the W2K3 box with hyperterminal(wait someone said theres something better than hyperterminal). word... as the west coast hackers say =)

Discord helped me with network-manager, not to be confused with this crappy network admin tool that was a standard ubuntu gnome feature. This one was supposed to take the sting out of wpa-supplicant, and the pain in the ass string of commands required every time you move around to a new AP.
sudo ifconfig eth0 down
password
sudo ifconfig eth1 up
sudo iwlist scan
sudo iwconfig eth1 essid "any"
sudo dhclient eth1

oh, 5 minutes latter your page wont load, WTF!, how did I get bumped from CoffeeandComics to seattle wi-fi (dont confuse this worthless piece of crap AP with the good folks at seattle wireless dot net).
sudo iwlist scan, sudo sudo sudo sudo Judo.... dam...

well anyway this network manager thing wont load, wont run, but is installed. Now if Discord and fR cant help you, buddy you had better be writing books on wireless foo, and the 'g'-nome desktop if you can figure that one out.

oh well, I need the practice typing anyway.

So its back to the shipyard grind on monday.

金曜日, 5月 05, 2006

Welcome back Javantea



















The link above will take you to JavanTea's blog which documented his recent trip to Japan, I must say when you read it you will feel like your there.

At any rate, I wanted to just say Welcome back, we missed you in your absence, and the neg9 meetings just weren't the same without you. J-tea had some interresting frames to check out from a Tokyo war drive...

here's a sample, hopefully he doesnt mind me printing this here. =) Im pretty sure if you asked him he'd share. find him on EFnet #neg9. on IRC.

No. Time Source Destination Protocol Info
1 0.000000 Melco_da:4b:c6 Broadcast Beacon frame Beacon frame,SN=1774,FN=0,BI=100, SSID: "asakusa21"

Frame 1 (83 bytes on wire, 83 bytes captured)
Arrival Time: Apr 25, 2006 20:15:33.139765000
Time delta from previous packet: 0.000000000 seconds
Time since reference or first frame: 0.000000000 seconds
Frame Number: 1
Packet Length: 83 bytes
Capture Length: 83 bytes
Protocols in frame: wlan
IEEE 802.11
Type/Subtype: Beacon frame (8)
Frame Control: 0x0080 (Normal)
Version: 0
Type: Management frame (0)
Subtype: 8
Flags: 0x0
DS status: Not leaving DS or network is operating in AD-HOC mode (To DS: 0 From DS: 0) (0x00)
.... .0.. = More Fragments: This is the last fragment
.... 0... = Retry: Frame is not being retransmitted
...0 .... = PWR MGT: STA will stay up
..0. .... = More Data: No data buffered
.0.. .... = WEP flag: WEP is disabled
0... .... = Order flag: Not strictly ordered
Duration: 0
Destination address: Broadcast (ff:ff:ff:ff:ff:ff)
Source address: Melco_da:4b:c6 (00:07:40:da:4b:c6)
BSS Id: Melco_da:4b:c6 (00:07:40:da:4b:c6)
Fragment number: 0
Sequence number: 1774
IEEE 802.11 wireless LAN management frame
Fixed parameters (12 bytes)
Timestamp: 0x0000001897F5A189
Beacon Interval: 0.102400 [Seconds]
Capability Information: 0x0431
.... .... .... ...1 = ESS capabilities: Transmitter is an AP
.... .... .... ..0. = IBSS status: Transmitter belongs to a BSS
.... ..0. .... 00.. = CFP participation capabilities: No point coordinator at AP (0x0000)
.... .... ...1 .... = Privacy: AP/STA can support WEP
.... .... ..1. .... = Short Preamble: Short preamble allowed
.... .... .0.. .... = PBCC: PBCC modulation not allowed
.... .... 0... .... = Channel Agility: Channel agility not in use
.... ...0 .... .... = Spectrum Management: dot11SpectrumManagementRequired FALSE
.... .1.. .... .... = Short Slot Time: Short slot time in use
.... 0... .... .... = Automatic Power Save Delivery: apsd not implemented
..0. .... .... .... = DSSS-OFDM: DSSS-OFDM modulation not allowed
.0.. .... .... .... = Delayed Block Ack: delayed block ack not implented
0... .... .... .... = Immediate Block Ack: immediate block ack not implented
Tagged parameters (47 bytes)
SSID parameter set: "asakusa21"
Tag Number: 0 (SSID parameter set)
Tag length: 9
Tag interpretation: asakusa21
Supported Rates: 1.0(B) 2.0(B) 5.5(B) 6.0(B) 9.0 11.0(B) 12.0(B) 18.0 24.0(B) 36.0 48.0 54.0
Tag Number: 1 (Supported Rates)
Tag length: 12
Tag interpretation: Supported rates: 1.0(B) 2.0(B) 5.5(B) 6.0(B) 9.0 11.0(B) 12.0(B) 18.0 24.0(B) 36.0 48.0 54.0 [Mbit/sec]
DS Parameter set: Current Channel: 11
Tag Number: 3 (DS Parameter set)
Tag length: 1
Tag interpretation: Current Channel: 11
(TIM) Traffic Indication Map: DTIM 0 of 1 bitmap empty
Tag Number: 5 ((TIM) Traffic Indication Map)
TIM length: 4
DTIM count: 0
DTIM period: 1
Bitmap Control: 0x00 (mcast:0, bitmap offset 0)
ERP Information: no Non-ERP STAs, do not use protection, long preambles
Tag Number: 42 (ERP Information)
Tag length: 1
Tag interpretation: ERP info: 0x0 (no Non-ERP STAs, do not use protection, long preambles)
ERP Information: no Non-ERP STAs, do not use protection, long preambles
Tag Number: 47 (ERP Information)
Tag length: 1
Tag interpretation: ERP info: 0x0 (no Non-ERP STAs, do not use protection, long preambles)
Vendor Specific
Tag Number: 221 (Vendor Specific)
Tag length: 5
Tag interpretation: Vendor "Broadcom" not interpreted

No. Time Source Destination Protocol Info
2 2.969716 Melco_da:4b:c6 Broadcast Beacon frame Beacon frame,SN=1803,FN=0,BI=100, SSID: "asakusa21"

Frame 2 (83 bytes on wire, 83 bytes captured)
Arrival Time: Apr 25, 2006 20:15:36.109481000
Time delta from previous packet: 2.969716000 seconds
Time since reference or first frame: 2.969716000 seconds
Frame Number: 2
Packet Length: 83 bytes
Capture Length: 83 bytes
Protocols in frame: wlan
IEEE 802.11
Type/Subtype: Beacon frame (8)
Frame Control: 0x0080 (Normal)
Version: 0
Type: Management frame (0)
Subtype: 8
Flags: 0x0
DS status: Not leaving DS or network is operating in AD-HOC mode (To DS: 0 From DS: 0) (0x00)
.... .0.. = More Fragments: This is the last fragment
.... 0... = Retry: Frame is not being retransmitted
...0 .... = PWR MGT: STA will stay up
..0. .... = More Data: No data buffered
.0.. .... = WEP flag: WEP is disabled
0... .... = Order flag: Not strictly ordered
Duration: 0
Destination address: Broadcast (ff:ff:ff:ff:ff:ff)
Source address: Melco_da:4b:c6 (00:07:40:da:4b:c6)
BSS Id: Melco_da:4b:c6 (00:07:40:da:4b:c6)
Fragment number: 0
Sequence number: 1803
IEEE 802.11 wireless LAN management frame
Fixed parameters (12 bytes)
Timestamp: 0x000000189822F207
Beacon Interval: 0.102400 [Seconds]
Capability Information: 0x0431
.... .... .... ...1 = ESS capabilities: Transmitter is an AP
.... .... .... ..0. = IBSS status: Transmitter belongs to a BSS
.... ..0. .... 00.. = CFP participation capabilities: No point coordinator at AP (0x0000)
.... .... ...1 .... = Privacy: AP/STA can support WEP
.... .... ..1. .... = Short Preamble: Short preamble allowed
.... .... .0.. .... = PBCC: PBCC modulation not allowed
.... .... 0... .... = Channel Agility: Channel agility not in use
.... ...0 .... .... = Spectrum Management: dot11SpectrumManagementRequired FALSE
.... .1.. .... .... = Short Slot Time: Short slot time in use
.... 0... .... .... = Automatic Power Save Delivery: apsd not implemented
..0. .... .... .... = DSSS-OFDM: DSSS-OFDM modulation not allowed
.0.. .... .... .... = Delayed Block Ack: delayed block ack not implented
0... .... .... .... = Immediate Block Ack: immediate block ack not implented
Tagged parameters (47 bytes)
SSID parameter set: "asakusa21"
Tag Number: 0 (SSID parameter set)
Tag length: 9
Tag interpretation: asakusa21
Supported Rates: 1.0(B) 2.0(B) 5.5(B) 6.0(B) 9.0 11.0(B) 12.0(B) 18.0 24.0(B) 36.0 48.0 54.0
Tag Number: 1 (Supported Rates)
Tag length: 12
Tag interpretation: Supported rates: 1.0(B) 2.0(B) 5.5(B) 6.0(B) 9.0 11.0(B) 12.0(B) 18.0 24.0(B) 36.0 48.0 54.0 [Mbit/sec]
DS Parameter set: Current Channel: 11
Tag Number: 3 (DS Parameter set)
Tag length: 1
Tag interpretation: Current Channel: 11
(TIM) Traffic Indication Map: DTIM 0 of 1 bitmap empty
Tag Number: 5 ((TIM) Traffic Indication Map)
TIM length: 4
DTIM count: 0
DTIM period: 1
Bitmap Control: 0x00 (mcast:0, bitmap offset 0)
ERP Information: no Non-ERP STAs, do not use protection, long preambles
Tag Number: 42 (ERP Information)
Tag length: 1
Tag interpretation: ERP info: 0x0 (no Non-ERP STAs, do not use protection, long preambles)
ERP Information: no Non-ERP STAs, do not use protection, long preambles
Tag Number: 47 (ERP Information)
Tag length: 1
Tag interpretation: ERP info: 0x0 (no Non-ERP STAs, do not use protection, long preambles)
Vendor Specific
Tag Number: 221 (Vendor Specific)
Tag length: 5
Tag interpretation: Vendor "Broadcom" not interpreted

No. Time Source Destination Protocol Info
3 3.077624 Melco_da:4b:c6 Broadcast Beacon frame Beacon frame,SN=1804,FN=0,BI=100, SSID: "asakusa21"

Frame 3 (83 bytes on wire, 83 bytes captured)
Arrival Time: Apr 25, 2006 20:15:36.217389000
Time delta from previous packet: 0.107908000 seconds
Time since reference or first frame: 3.077624000 seconds
Frame Number: 3
Packet Length: 83 bytes
Capture Length: 83 bytes
Protocols in frame: wlan
IEEE 802.11
Type/Subtype: Beacon frame (8)
Frame Control: 0x0080 (Normal)
Version: 0
Type: Management frame (0)
Subtype: 8
Flags: 0x0
DS status: Not leaving DS or network is operating in AD-HOC mode (To DS: 0 From DS: 0) (0x00)
.... .0.. = More Fragments: This is the last fragment
.... 0... = Retry: Frame is not being retransmitted
...0 .... = PWR MGT: STA will stay up
..0. .... = More Data: No data buffered
.0.. .... = WEP flag: WEP is disabled
0... .... = Order flag: Not strictly ordered
Duration: 0
Destination address: Broadcast (ff:ff:ff:ff:ff:ff)
Source address: Melco_da:4b:c6 (00:07:40:da:4b:c6)
BSS Id: Melco_da:4b:c6 (00:07:40:da:4b:c6)
Fragment number: 0
Sequence number: 1804
IEEE 802.11 wireless LAN management frame
Fixed parameters (12 bytes)
Timestamp: 0x0000001898249787
Beacon Interval: 0.102400 [Seconds]
Capability Information: 0x0431
.... .... .... ...1 = ESS capabilities: Transmitter is an AP
.... .... .... ..0. = IBSS status: Transmitter belongs to a BSS
.... ..0. .... 00.. = CFP participation capabilities: No point coordinator at AP (0x0000)
.... .... ...1 .... = Privacy: AP/STA can support WEP
.... .... ..1. .... = Short Preamble: Short preamble allowed
.... .... .0.. .... = PBCC: PBCC modulation not allowed
.... .... 0... .... = Channel Agility: Channel agility not in use
.... ...0 .... .... = Spectrum Management: dot11SpectrumManagementRequired FALSE
.... .1.. .... .... = Short Slot Time: Short slot time in use
.... 0... .... .... = Automatic Power Save Delivery: apsd not implemented
..0. .... .... .... = DSSS-OFDM: DSSS-OFDM modulation not allowed
.0.. .... .... .... = Delayed Block Ack: delayed block ack not implented
0... .... .... .... = Immediate Block Ack: immediate block ack not implented
Tagged parameters (47 bytes)
SSID parameter set: "asakusa21"
Tag Number: 0 (SSID parameter set)
Tag length: 9
Tag interpretation: asakusa21
Supported Rates: 1.0(B) 2.0(B) 5.5(B) 6.0(B) 9.0 11.0(B) 12.0(B) 18.0 24.0(B) 36.0 48.0 54.0
Tag Number: 1 (Supported Rates)
Tag length: 12
Tag interpretation: Supported rates: 1.0(B) 2.0(B) 5.5(B) 6.0(B) 9.0 11.0(B) 12.0(B) 18.0 24.0(B) 36.0 48.0 54.0 [Mbit/sec]
DS Parameter set: Current Channel: 11
Tag Number: 3 (DS Parameter set)
Tag length: 1
Tag interpretation: Current Channel: 11
(TIM) Traffic Indication Map: DTIM 0 of 1 bitmap empty
Tag Number: 5 ((TIM) Traffic Indication Map)
TIM length: 4
DTIM count: 0
DTIM period: 1
Bitmap Control: 0x00 (mcast:0, bitmap offset 0)
ERP Information: no Non-ERP STAs, do not use protection, long preambles
Tag Number: 42 (ERP Information)
Tag length: 1
Tag interpretation: ERP info: 0x0 (no Non-ERP STAs, do not use protection, long preambles)
ERP Information: no Non-ERP STAs, do not use protection, long preambles
Tag Number: 47 (ERP Information)
Tag length: 1
Tag interpretation: ERP info: 0x0 (no Non-ERP STAs, do not use protection, long preambles)
Vendor Specific
Tag Number: 221 (Vendor Specific)
Tag length: 5
Tag interpretation: Vendor "Broadcom" not interpreted

No. Time Source Destination Protocol Info
4 5.939298 Melco_da:4b:c6 Broadcast Beacon frame Beacon frame,SN=1833,FN=0,BI=100, SSID: "asakusa21"

Frame 4 (83 bytes on wire, 83 bytes captured)
Arrival Time: Apr 25, 2006 20:15:39.079063000
Time delta from previous packet: 2.861674000 seconds
Time since reference or first frame: 5.939298000 seconds
Frame Number: 4
Packet Length: 83 bytes
Capture Length: 83 bytes
Protocols in frame: wlan
IEEE 802.11
Type/Subtype: Beacon frame (8)
Frame Control: 0x0080 (Normal)
Version: 0
Type: Management frame (0)
Subtype: 8
Flags: 0x0
DS status: Not leaving DS or network is operating in AD-HOC mode (To DS: 0 From DS: 0) (0x00)
.... .0.. = More Fragments: This is the last fragment
.... 0... = Retry: Frame is not being retransmitted
...0 .... = PWR MGT: STA will stay up
..0. .... = More Data: No data buffered
.0.. .... = WEP flag: WEP is disabled
0... .... = Order flag: Not strictly ordered
Duration: 0
Destination address: Broadcast (ff:ff:ff:ff:ff:ff)
Source address: Melco_da:4b:c6 (00:07:40:da:4b:c6)
BSS Id: Melco_da:4b:c6 (00:07:40:da:4b:c6)
Fragment number: 0
Sequence number: 1833
IEEE 802.11 wireless LAN management frame
Fixed parameters (12 bytes)
Timestamp: 0x0000001898504187
Beacon Interval: 0.102400 [Seconds]
Capability Information: 0x0431
.... .... .... ...1 = ESS capabilities: Transmitter is an AP
.... .... .... ..0. = IBSS status: Transmitter belongs to a BSS
.... ..0. .... 00.. = CFP participation capabilities: No point coordinator at AP (0x0000)
.... .... ...1 .... = Privacy: AP/STA can support WEP
.... .... ..1. .... = Short Preamble: Short preamble allowed
.... .... .0.. .... = PBCC: PBCC modulation not allowed
.... .... 0... .... = Channel Agility: Channel agility not in use
.... ...0 .... .... = Spectrum Management: dot11SpectrumManagementRequired FALSE
.... .1.. .... .... = Short Slot Time: Short slot time in use
.... 0... .... .... = Automatic Power Save Delivery: apsd not implemented
..0. .... .... .... = DSSS-OFDM: DSSS-OFDM modulation not allowed
.0.. .... .... .... = Delayed Block Ack: delayed block ack not implented
0... .... .... .... = Immediate Block Ack: immediate block ack not implented
Tagged parameters (47 bytes)
SSID parameter set: "asakusa21"
Tag Number: 0 (SSID parameter set)
Tag length: 9
Tag interpretation: asakusa21
Supported Rates: 1.0(B) 2.0(B) 5.5(B) 6.0(B) 9.0 11.0(B) 12.0(B) 18.0 24.0(B) 36.0 48.0 54.0
Tag Number: 1 (Supported Rates)
Tag length: 12
Tag interpretation: Supported rates: 1.0(B) 2.0(B) 5.5(B) 6.0(B) 9.0 11.0(B) 12.0(B) 18.0 24.0(B) 36.0 48.0 54.0 [Mbit/sec]
DS Parameter set: Current Channel: 11
Tag Number: 3 (DS Parameter set)
Tag length: 1
Tag interpretation: Current Channel: 11
(TIM) Traffic Indication Map: DTIM 0 of 1 bitmap empty
Tag Number: 5 ((TIM) Traffic Indication Map)
TIM length: 4
DTIM count: 0
DTIM period: 1
Bitmap Control: 0x00 (mcast:0, bitmap offset 0)
ERP Information: no Non-ERP STAs, do not use protection, long preambles
Tag Number: 42 (ERP Information)
Tag length: 1
Tag interpretation: ERP info: 0x0 (no Non-ERP STAs, do not use protection, long preambles)
ERP Information: no Non-ERP STAs, do not use protection, long preambles
Tag Number: 47 (ERP Information)
Tag length: 1
Tag interpretation: ERP info: 0x0 (no Non-ERP STAs, do not use protection, long preambles)
Vendor Specific
Tag Number: 221 (Vendor Specific)
Tag length: 5
Tag interpretation: Vendor "Broadcom" not interpreted

No. Time Source Destination Protocol Info
5 6.041618 Melco_da:4b:c6 Broadcast Beacon frame Beacon frame,SN=1834,FN=0,BI=100, SSID: "asakusa21"

Frame 5 (83 bytes on wire, 83 bytes captured)
Arrival Time: Apr 25, 2006 20:15:39.181383000
Time delta from previous packet: 0.102320000 seconds
Time since reference or first frame: 6.041618000 seconds
Frame Number: 5
Packet Length: 83 bytes
Capture Length: 83 bytes
Protocols in frame: wlan
IEEE 802.11
Type/Subtype: Beacon frame (8)
Frame Control: 0x0080 (Normal)
Version: 0
Type: Management frame (0)
Subtype: 8
Flags: 0x0
DS status: Not leaving DS or network is operating in AD-HOC mode (To DS: 0 From DS: 0) (0x00)
.... .0.. = More Fragments: This is the last fragment
.... 0... = Retry: Frame is not being retransmitted
...0 .... = PWR MGT: STA will stay up
..0. .... = More Data: No data buffered
.0.. .... = WEP flag: WEP is disabled
0... .... = Order flag: Not strictly ordered
Duration: 0
Destination address: Broadcast (ff:ff:ff:ff:ff:ff)
Source address: Melco_da:4b:c6 (00:07:40:da:4b:c6)
BSS Id: Melco_da:4b:c6 (00:07:40:da:4b:c6)
Fragment number: 0
Sequence number: 1834
IEEE 802.11 wireless LAN management frame
Fixed parameters (12 bytes)
Timestamp: 0x000000189851D185
Beacon Interval: 0.102400 [Seconds]
Capability Information: 0x0431
.... .... .... ...1 = ESS capabilities: Transmitter is an AP
.... .... .... ..0. = IBSS status: Transmitter belongs to a BSS
.... ..0. .... 00.. = CFP participation capabilities: No point coordinator at AP (0x0000)
.... .... ...1 .... = Privacy: AP/STA can support WEP
.... .... ..1. .... = Short Preamble: Short preamble allowed
.... .... .0.. .... = PBCC: PBCC modulation not allowed
.... .... 0... .... = Channel Agility: Channel agility not in use
.... ...0 .... .... = Spectrum Management: dot11SpectrumManagementRequired FALSE
.... .1.. .... .... = Short Slot Time: Short slot time in use
.... 0... .... .... = Automatic Power Save Delivery: apsd not implemented
..0. .... .... .... = DSSS-OFDM: DSSS-OFDM modulation not allowed
.0.. .... .... .... = Delayed Block Ack: delayed block ack not implented
0... .... .... .... = Immediate Block Ack: immediate block ack not implented
Tagged parameters (47 bytes)
SSID parameter set: "asakusa21"
Tag Number: 0 (SSID parameter set)
Tag length: 9
Tag interpretation: asakusa21
Supported Rates: 1.0(B) 2.0(B) 5.5(B) 6.0(B) 9.0 11.0(B) 12.0(B) 18.0 24.0(B) 36.0 48.0 54.0
Tag Number: 1 (Supported Rates)
Tag length: 12
Tag interpretation: Supported rates: 1.0(B) 2.0(B) 5.5(B) 6.0(B) 9.0 11.0(B) 12.0(B) 18.0 24.0(B) 36.0 48.0 54.0 [Mbit/sec]
DS Parameter set: Current Channel: 11
Tag Number: 3 (DS Parameter set)
Tag length: 1
Tag interpretation: Current Channel: 11
(TIM) Traffic Indication Map: DTIM 0 of 1 bitmap empty
Tag Number: 5 ((TIM) Traffic Indication Map)
TIM length: 4
DTIM count: 0
DTIM period: 1
Bitmap Control: 0x00 (mcast:0, bitmap offset 0)
ERP Information: no Non-ERP STAs, do not use protection, long preambles
Tag Number: 42 (ERP Information)
Tag length: 1
Tag interpretation: ERP info: 0x0 (no Non-ERP STAs, do not use protection, long preambles)
ERP Information: no Non-ERP STAs, do not use protection, long preambles
Tag Number: 47 (ERP Information)
Tag length: 1
Tag interpretation: ERP info: 0x0 (no Non-ERP STAs, do not use protection, long preambles)
Vendor Specific
Tag Number: 221 (Vendor Specific)
Tag length: 5
Tag interpretation: Vendor "Broadcom" not interpreted

No. Time Source Destination Protocol Info
6 8.908850 Melco_da:4b:c6 Broadcast Beacon frame Beacon frame,SN=1862,FN=0,BI=100, SSID: "asakusa21"

Frame 6 (83 bytes on wire, 83 bytes captured)
Arrival Time: Apr 25, 2006 20:15:42.048615000
Time delta from previous packet: 2.867232000 seconds
Time since reference or first frame: 8.908850000 seconds
Frame Number: 6
Packet Length: 83 bytes
Capture Length: 83 bytes
Protocols in frame: wlan
IEEE 802.11
Type/Subtype: Beacon frame (8)
Frame Control: 0x0080 (Normal)
Version: 0
Type: Management frame (0)
Subtype: 8
Flags: 0x0
DS status: Not leaving DS or network is operating in AD-HOC mode (To DS: 0 From DS: 0) (0x00)
.... .0.. = More Fragments: This is the last fragment
.... 0... = Retry: Frame is not being retransmitted
...0 .... = PWR MGT: STA will stay up
..0. .... = More Data: No data buffered
.0.. .... = WEP flag: WEP is disabled
0... .... = Order flag: Not strictly ordered
Duration: 0
Destination address: Broadcast (ff:ff:ff:ff:ff:ff)
Source address: Melco_da:4b:c6 (00:07:40:da:4b:c6)
BSS Id: Melco_da:4b:c6 (00:07:40:da:4b:c6)
Fragment number: 0
Sequence number: 1862
IEEE 802.11 wireless LAN management frame
Fixed parameters (12 bytes)
Timestamp: 0x00000018987D918A
Beacon Interval: 0.102400 [Seconds]
Capability Information: 0x0431
.... .... .... ...1 = ESS capabilities: Transmitter is an AP
.... .... .... ..0. = IBSS status: Transmitter belongs to a BSS
.... ..0. .... 00.. = CFP participation capabilities: No point coordinator at AP (0x0000)
.... .... ...1 .... = Privacy: AP/STA can support WEP
.... .... ..1. .... = Short Preamble: Short preamble allowed
.... .... .0.. .... = PBCC: PBCC modulation not allowed
.... .... 0... .... = Channel Agility: Channel agility not in use
.... ...0 .... .... = Spectrum Management: dot11SpectrumManagementRequired FALSE
.... .1.. .... .... = Short Slot Time: Short slot time in use
.... 0... .... .... = Automatic Power Save Delivery: apsd not implemented
..0. .... .... .... = DSSS-OFDM: DSSS-OFDM modulation not allowed
.0.. .... .... .... = Delayed Block Ack: delayed block ack not implented
0... .... .... .... = Immediate Block Ack: immediate block ack not implented
Tagged parameters (47 bytes)
SSID parameter set: "asakusa21"
Tag Number: 0 (SSID parameter set)
Tag length: 9
Tag interpretation: asakusa21
Supported Rates: 1.0(B) 2.0(B) 5.5(B) 6.0(B) 9.0 11.0(B) 12.0(B) 18.0 24.0(B) 36.0 48.0 54.0
Tag Number: 1 (Supported Rates)
Tag length: 12
Tag interpretation: Supported rates: 1.0(B) 2.0(B) 5.5(B) 6.0(B) 9.0 11.0(B) 12.0(B) 18.0 24.0(B) 36.0 48.0 54.0 [Mbit/sec]
DS Parameter set: Current Channel: 11
Tag Number: 3 (DS Parameter set)
Tag length: 1
Tag interpretation: Current Channel: 11
(TIM) Traffic Indication Map: DTIM 0 of 1 bitmap empty
Tag Number: 5 ((TIM) Traffic Indication Map)
TIM length: 4
DTIM count: 0
DTIM period: 1
Bitmap Control: 0x00 (mcast:0, bitmap offset 0)
ERP Information: no Non-ERP STAs, do not use protection, long preambles
Tag Number: 42 (ERP Information)
Tag length: 1
Tag interpretation: ERP info: 0x0 (no Non-ERP STAs, do not use protection, long preambles)
ERP Information: no Non-ERP STAs, do not use protection, long preambles
Tag Number: 47 (ERP Information)
Tag length: 1
Tag interpretation: ERP info: 0x0 (no Non-ERP STAs, do not use protection, long preambles)
Vendor Specific
Tag Number: 221 (Vendor Specific)
Tag length: 5
Tag interpretation: Vendor "Broadcom" not interpreted

No. Time Source Destination Protocol Info
7 9.411958 AppleCom_2c:71:00 Broadcast Probe Request Probe Request,SN=3541,FN=0, SSID: "00-30-79-a6-e6-82-3cb88cd0"

Frame 7 (58 bytes on wire, 58 bytes captured)
Arrival Time: Apr 25, 2006 20:15:42.551723000
Time delta from previous packet: 0.503108000 seconds
Time since reference or first frame: 9.411958000 seconds
Frame Number: 7
Packet Length: 58 bytes
Capture Length: 58 bytes
Protocols in frame: wlan
IEEE 802.11
Type/Subtype: Probe Request (4)
Frame Control: 0x0040 (Normal)
Version: 0
Type: Management frame (0)
Subtype: 4
Flags: 0x0
DS status: Not leaving DS or network is operating in AD-HOC mode (To DS: 0 From DS: 0) (0x00)
.... .0.. = More Fragments: This is the last fragment
.... 0... = Retry: Frame is not being retransmitted
...0 .... = PWR MGT: STA will stay up
..0. .... = More Data: No data buffered
.0.. .... = WEP flag: WEP is disabled
0... .... = Order flag: Not strictly ordered
Duration: 0
Destination address: Broadcast (ff:ff:ff:ff:ff:ff)
Source address: AppleCom_2c:71:00 (00:30:65:2c:71:00)
BSS Id: Broadcast (ff:ff:ff:ff:ff:ff)
Fragment number: 0
Sequence number: 3541
IEEE 802.11 wireless LAN management frame
Tagged parameters (34 bytes)
SSID parameter set: "00-30-79-a6-e6-82-3cb88cd0"
Tag Number: 0 (SSID parameter set)
Tag length: 26
Tag interpretation: 00-30-79-a6-e6-82-3cb88cd0
Supported Rates: 1.0 2.0 5.5 11.0
Tag Number: 1 (Supported Rates)
Tag length: 4
Tag interpretation: Supported rates: 1.0 2.0 5.5 11.0 [Mbit/sec]

No. Time Source Destination Protocol Info
8 9.440774 AppleCom_2c:71:00 Broadcast Probe Request Probe Request,SN=3545,FN=0, SSID: "00-30-79-a6-e6-82-3cb88cd0"

Frame 8 (58 bytes on wire, 58 bytes captured)
Arrival Time: Apr 25, 2006 20:15:42.580539000
Time delta from previous packet: 0.028816000 seconds
Time since reference or first frame: 9.440774000 seconds
Frame Number: 8
Packet Length: 58 bytes
Capture Length: 58 bytes
Protocols in frame: wlan
IEEE 802.11
Type/Subtype: Probe Request (4)
Frame Control: 0x0040 (Normal)
Version: 0
Type: Management frame (0)
Subtype: 4
Flags: 0x0
DS status: Not leaving DS or network is operating in AD-HOC mode (To DS: 0 From DS: 0) (0x00)
.... .0.. = More Fragments: This is the last fragment
.... 0... = Retry: Frame is not being retransmitted
...0 .... = PWR MGT: STA will stay up
..0. .... = More Data: No data buffered
.0.. .... = WEP flag: WEP is disabled
0... .... = Order flag: Not strictly ordered
Duration: 0
Destination address: Broadcast (ff:ff:ff:ff:ff:ff)
Source address: AppleCom_2c:71:00 (00:30:65:2c:71:00)
BSS Id: Broadcast (ff:ff:ff:ff:ff:ff)
Fragment number: 0
Sequence number: 3545
IEEE 802.11 wireless LAN management frame
Tagged parameters (34 bytes)
SSID parameter set: "00-30-79-a6-e6-82-3cb88cd0"
Tag Number: 0 (SSID parameter set)
Tag length: 26
Tag interpretation: 00-30-79-a6-e6-82-3cb88cd0
Supported Rates: 1.0 2.0 5.5 11.0
Tag Number: 1 (Supported Rates)
Tag length: 4
Tag interpretation: Supported rates: 1.0 2.0 5.5 11.0 [Mbit/sec]