Solved

sharing internet connection

Posted on 2008-10-27
5
204 Views
Last Modified: 2013-12-14
My neighbor and I are considering splitting our internet cost each month by signing up for one account and using a wireless access point to feed internet to my house.  Neither of us are avid internet users so we can live with modest speeds and bandwidth

First off is this legal?

Secondly, if he has the router and I only have an access point, will I have no privacy?  In other words if I am typing an email will he see what I am typing and will he see where I am surfing?

thanks
0
Comment
Question by:jasguild
  • 3
  • 2
5 Comments
 
LVL 16

Expert Comment

by:sh0e
ID: 22818661
It's not illegal.  It may be against your ISP's terms of service though.  Some ISPs are known to try to prevent such attempts.

Wireless is inherently interceptable.  Make sure you are using WPA.

It is possible for him to intercept your data (with special software), but there's really no way around that.  Even in that set up, there are ways for you to intercept his data, as long as you are connected.

For practical purposes, just use WPA and make sure he's not up to any funny business.  If he's not technically adept, I wouldn't be all that worried.
0
 

Author Comment

by:jasguild
ID: 22818780
He is very savy in fact he has some networking certification.   To be honest, I am not doing anything illegal on the web so I am not too worried about it but would like to have some privacy just for the principle of it.  

What is WPA?? HOw do I make sure that he is using this.  

jasguild
0
 
LVL 16

Expert Comment

by:sh0e
ID: 22818818
Because he is savvy, there is not much you can do other than make sure you can trust him.  Either way, if you guys are connected, you will need to trust him.  It's probably a good thing that he's savvy, as any problems can be solved by him.
Ask the guy to make sure he enables WPA on the access point, he should know what it is.  

Instructions on how to configure WPA on XP:
http://compnetworking.about.com/cs/winxpnetworking/ht/wpainwindowsxp.htm

As configuring WPA may not be easy if you are inexperienced, I would recommend asking the guy to help you out.
0
 

Author Comment

by:jasguild
ID: 22819073
So in a nutt shell what are my risks??

Is it that he may be chekcing out what sites I am surfing on ??  Or is it that he will be able to see my bank account numbers etc.   I truly  trust the guy but you never know.

This is why I would prefer to minimize my risk and know what I am getting into.

jasguild
0
 
LVL 16

Accepted Solution

by:
sh0e earned 220 total points
ID: 22819180
Most banks use HTTPS://, so it should be fine.  Just be wary if you get warnings about your certificates in your browser.
Yes, in theory he could use Man-In-The-Middle attack and sit between you and the internet, passing the data back and forth.  Meanwhile, he gets a copy of the data, and you don't realize anything has happened.  HTTPS:// (SSL) reduces the risk, and will warn you about invalid certificates.

Wireless eavesdropping is another issue, and is potentially worse, as anyone in range could in theory grab the data.
This is why I recommend you use WPA (Wi-Fi Protected Access).  This encrypts the data sent over wireless to reduce the risk eavesdropping.  If WPA is not available, you can also use WEP, which is weaker than WPA but will reduce your risks slightly.  WEP isn't much good for anything more than preventing unintentional use.

Since the guy is network certified, you probably don't have to worry about him configuring the access point correctly.
0

Featured Post

How your wiki can always stay up-to-date

Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
- Increase transparency
- Onboard new hires faster
- Access from mobile/offline

Join & Write a Comment

In the modern office, employees tend to move around the workplace a lot more freely. Conferences, collaborative groups, flexible seating and working from home require a new level of mobility. Technology has not only changed the behavior and the expe…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…
When you create an app prototype with Adobe XD, you can insert system screens -- sharing or Control Center, for example -- with just a few clicks. This video shows you how. You can take the full course on Experts Exchange at http://bit.ly/XDcourse.

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now