![]() |
Help, wireless network hacked??? Hey guys, bear with me, I'm not that tech savvy. Anyways, I don't use my wifi that often, but lately I noticed my Kindle hasn't been able to connnect to my wifi, basically when I scan networks, my network (Jeremy's Wireless with WPA-personal setting) is not detected. Thought it was just my Kindle, but tried connecting to wifi with my netbook and same problem. So I look into my router settings, and now, I just noticed my network SSID has been changed to "THE RCMP ARE CORRUPT - LOLGGNORE"! WTF???!!! Also, security mode has been changed to "disable security" and host status is "inactive". Even when I try to connect to this network, I still can't connect. Anyways, how did this happen? I have McAfee Total Protection all the time. And secondly, how do I fix this???!!! I've called Telus technical support and I'm waiting for my callback (not sure if tech support is open after 8pm)...but any help in the meantime is appreciated!!! |
Hard-reset your router to factory defaults (there will be a recessed button for it somewhere), then set everything up the way you want it again. McAfee only protects the machine it's on... someone could have hacked the router itself, or another system connected to it. If you have remote administration enabled, they could have got into it that way. Are you using the Telus all-in-one modem/router, like the Siemens or 2Wire unit? |
^It's a Telus all-in-one Siemens SE567...I'm on the phone with tech support now. He doesn't think it was hacked...something about a failed system update? I think given the name of my SSID, it sounds like it was hacked? |
Just find the button on the router that resets it. Press it and set everything up again |
Quote:
|
|
Quote:
|
Telus all-in-one Siemens SE567 is garbage |
Quote:
|
Quote:
|
There are lots of great routers for <$100, no need to wait. A-Power has this one on sale for $50 right now: A-Power.com - Buy TP-Link TL-WR1043ND 4 Port Wireless N Gigabit Router 2.4GHZ 802.11 N/G/B 300MBPS #15925 - TL-WR1043ND - Canada First thing you can do to secure your Siemens though, is change the admin password - it's "telus" by default and I have yet to come across one that the user has changed. Once you have a new router, you should disable the wireless on the Siemens and set it to operate in bridged mode, thus disabling all the router functions, and make sure to change the admin password. |
D-Link DIR-655 is what's recommended a lot and what I currently use. Rock solid and has never crapped out on me. ASUS RT-N16 is decent too if you like flashing ddwrt/tomato firmwares. |
Those are good ones too - I have an RT-N16 running DD-WRT, and when I got it, I gave my sister my DIR-655. Both have USB ports for USB disk/printer sharing as well. |
Quote:
everyone else on RS reading it: :fuckthatshit: |
After reading this thread, I'm finally getting rid of my piece of shit Siemens for the DIR-655. |
One simple security feature you can enable is hiding your SSID. The only difference is that it takes two more steps to setup a new wifi device, but it would be much, much harder for an average person to hack into it. |
Hide SSID and use a MAC filter. That's all I do. Posted via RS Mobile |
You did not get "hacked" You probably didnt change your admin password let me guess your router ip is 192.168.1.254 username Admin password telus |
Quote:
I'm betting that the wireless encryption was set to WEP, which is an encryption type that can be hacked. when you set your new password, you should use WPA encryption. that, as far as I know is virtually unbreakable. |
Costco has the Linksys E3000, does anyone have any experiences/opinions on this router? |
Null Hello, I'm just going to be forward and reveal, I am the "hacker" who has broken into over thirty thousand (and counting) Telus customers' routers and internal networks. I will not disclose any details regarding the technical side of the breach, but I will say that I am able to run any command on any of the routers Telus has FORCED upon their customers, as an administrator, regardless of whether they have changed the password on the hardware or not. This includes forwarding any traffic I want past the software firewall in the routers into the users' internal network. Telus has abused their customers for far too long, opening unpatchable (save for new hardware) holes, while at the same time blocking basic functionality of a network connection (in the name of security. HA!), and in general, not being even close to network neutral. I will use this platform as a way to broadcast a message across the provinces. The RCMP in this country have for too long been allowed to run unchecked. They have more power than any other organization in the country, and know it. I look forward to the day when I can see a police officer and feel protected, not fear of their ability to act however they please with little or no repercussions. Perhaps this will be once the RCMP lose provincial contracts, or are forced to abide by stricter regulation. But I doubt it. The thought that you can give any human overwhelming power over other humans, with no outside influence, and expect them to maintain their principals, is absurd. In the interest of brevity, I will end only by saying this. The attacks will continue to happen until Telus agrees to fix the issues within their network, and revise their business standards, and I will take any opportunity I see fit, to oppose the organized criminal group we know as the police. Do not try to find me, you will fail. We are anonymous. We are legion. Expect us. Sincerely, LOLGGNoRe PS: I also have a small Penis and the police laughed at me after they beat me up. |
ummmmmmmmmmmmm |
who the fuck is this idiot? |
Sorry to threadjack, but I'm having issues setting up the DIR-655. When I try to use the installer disk, the default telus info refuses to work, and if I go without a password and follow the steps, it won't move past the step where you turn on the router. Will the Siemens still have to be connected anyways? What am I doing wrong here? |
Quote:
|
All times are GMT -8. The time now is 05:54 PM. |
Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2025, vBulletin Solutions Inc.
SEO by vBSEO ©2011, Crawlability, Inc.
Revscene.net cannot be held accountable for the actions of its members nor does the opinions of the members represent that of Revscene.net