• SSUPII@sopuli.xyz
      link
      fedilink
      arrow-up
      95
      ·
      edit-2
      12 days ago

      As an early teen my parents turned off the WiFi router at night and when not in use. I eventually found the neighbor had an exploitable WEP router from an Android app, and I used it to continue watching Minecraft and Happy Wheels videos on Youtube.

        • moonshadow@slrpnk.net
          link
          fedilink
          arrow-up
          92
          ·
          12 days ago

          Congrats, pretty sure “mom took away my internet” is the primary entry point for IT professionals

          • Hudell@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            8
            ·
            12 days ago

            For me it was my older brother (who owned the only computer in the house). He had very strict rules about what I could do on his PC but even then he would only leave his room unlocked once a week at most. This was before I even cared for internet so being offline was no big deal.

            When I was 13 I managed to talk my way into doing some chores for a neighborhood PC school in exchange for access to computers whenever there was some free spot in any of their classes. A couple years later they opened a Lan House so I worked there and could finally use PCs all day every day. One more year and I was already teaching programming classes there (well, trying to).

          • cravl@slrpnk.net
            link
            fedilink
            arrow-up
            9
            ·
            12 days ago

            Similar situation: I legit taught myself how to use aircrack-ng when I was like 12 because I wanted to play Mario Kart on my grandma’s Wii, but it needed internet to download an update, which she didn’t have. However, the neighbor had a WEP-encrypted network, and I was staying the night. The rest is history.

          • BallShapedMan@lemmy.world
            link
            fedilink
            arrow-up
            42
            ·
            12 days ago

            Lol his reward was I retired from family tech support and gave the reins to him. He loved it at first but realized it for the curse it was within a few months.

            Hes given it back to me by refusing to call my parents back when they call asking for help. I’d ground him but he’s an adult and my shenanigans don’t mean much anymore 😂

          • chocrates@piefed.world
            link
            fedilink
            English
            arrow-up
            1
            ·
            edit-2
            12 days ago

            I got old 😭

            I got in after pcs were consumer devices but before the Internet (mostly because I was rural).

          • 4am@lemmy.zip
            link
            fedilink
            arrow-up
            1
            ·
            12 days ago

            I’m older, so my entry point was “I wanna make my OWN Marios”

          • SSUPII@sopuli.xyz
            link
            fedilink
            arrow-up
            11
            ·
            12 days ago

            I was already really interested in computers myself. My own explosion of interest was a game called WarioWare: D.I.Y. that let you make minigames using a built-in editor.

            • moonshadow@slrpnk.net
              link
              fedilink
              arrow-up
              5
              ·
              12 days ago

              I’m old enough you have to replace “cracking neighbors wifi” with cloning our modem and “youtube” with funny pictures from irc homies, but same. Working around internet access restrictions was a milestone between fun things I could do with computers and how they really worked

                • moonshadow@slrpnk.net
                  link
                  fedilink
                  arrow-up
                  8
                  ·
                  12 days ago

                  They would unplug our isp provided modem and take it to bed with them, so I tracked down another one from the manufacturer and copied the eeprom from theirs onto it. It was a simpler time :p

      • mic_check_one_two@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        8
        ·
        12 days ago

        Yeah, there’s the old “strict parents make sneaky kids” saying that is often very true. Parents who try to lock down their tech often find that kids will just bypass the tech entirely. Nothing is more singularly motivated than a 14 year old who wants to look at tits, and locking it down only encourages them to do shady shit like get a secret prepaid phone, or hack the neighbor’s WiFi.

  • Redredme@lemmy.world
    link
    fedilink
    arrow-up
    74
    arrow-down
    1
    ·
    12 days ago

    Guest vlan? Smart.

    Blocking 80/443 knowing all to well everything depends on those: evil.

    Throttling to 56k: the original original poster just being a dick.

    Took 45 minutes: Maybe find another job. You’re not good at it.

    Conclusion: The sister was right. Evil incompetent dick.

    • andioop@programming.dev
      link
      fedilink
      English
      arrow-up
      14
      ·
      11 days ago

      I have a feeling this is satire, and I’m usually the type of person to miss the joke and think it’s genuine

      • Honytawk@feddit.nl
        link
        fedilink
        arrow-up
        2
        ·
        10 days ago

        Even if it is satire, doesn’t mean we can do a full breakdown, especially for comedic value.

    • Taleya@aussie.zone
      link
      fedilink
      English
      arrow-up
      1
      ·
      11 days ago

      I mean fuck me, i can build an entire bespoke DDU from bare metal to cool down in less time than that.

    • tetris11@feddit.uk
      link
      fedilink
      English
      arrow-up
      30
      ·
      edit-2
      12 days ago

      Took 45 minutes: Maybe find another job. You’re not good at it.

      Bit harsh.

      The OpenWRT guest wifi guide isn’t a simple switch like you would get on your OEM router, but involves manually setting up a bridge device, a new firewall zone, and a new AP on one of your radios.

      This can take some time if you want to do things the right way. 10 minutes to setup with no extra config steps. Add another 10 if you need to move around your firewall rules, and another 20 for random debugging.

      https://openwrt.org/docs/guide-user/network/wifi/guestwifi/configuration_webinterface

      Although, you set it up once. After that it’s just a checkbox.

      • nibbler@discuss.tchncs.de
        link
        fedilink
        English
        arrow-up
        24
        ·
        12 days ago

        and of course you need to tag the new network on all your switches, routers, APs… not to forget testing and integration in your monitoring system. 45 minutes is absolutely fine.

    • rumba@lemmy.zip
      link
      fedilink
      English
      arrow-up
      37
      ·
      12 days ago

      Ohh fuck yes, I support antivirus, but only on Windows, maybe, possibly OSX. If you give bare Windows to a kid, they’ll have viruses as soon as they learn to use Google.

      TBF, Fam gets my guest network. It’s not allowed to touch anything in my house, they can only route through. DHCP sends their DNS to 4.2.2.2 and 8.8.8.8, They can’t even touch my DNS, they can’t see any of my home automation and they can’t see each other. They can push the connection as hard as they want, the QOS won’t let them take priority.

      • ITGuyLevi@programming.dev
        link
        fedilink
        arrow-up
        19
        ·
        12 days ago

        For my son I just used APLs in group policy. Only approved apps could run. I encouraged him to be better than me and he has definitely kept me on my toes. Now he is in college for cyber security and loving it.

        So far he hasn’t broken anything major on his computer or the network, well, aside from messing up his BIOS a couple times… But then he got to teach me how to program EEPROM (like I said, he has kept me learning stuff I normally wouldn’t).

        • rumba@lemmy.zip
          link
          fedilink
          English
          arrow-up
          10
          ·
          12 days ago

          EEPROM’s are fun. If you want more of that, check out Ben Eater on YouTube, he has a giant series on building an 8-bit computer from scratch. he actually goes through the whole design philosophy. There’s a lot of ‘new’ stuff in there that’s not entirely boring.

    • cm0002@mander.xyzOP
      link
      fedilink
      arrow-up
      14
      ·
      12 days ago

      Lol generally I’ll refer to the OS builtin tooling (XProtect/MS Defender) and EDRs as “Antivirus” otherwise the non-techies will freak OmG wE hAVe NO aV! And then the “anti”-viruses like mcafee and Kaspersky mysteriously spawns

      And also on-demand AV software can be good for spot checks or if you’re sus of something.

      It’s the “Real-time” shit that hooks into the kernel that needs to be avoided like the plague

      • krooklochurm@lemmy.ca
        link
        fedilink
        arrow-up
        3
        ·
        12 days ago

        When i was a windows person many moons ago i ran into viruses once or twice. Kaspersky was the only av in those days that effectively cleaned them from my system.

        Now i am a linux dude. Where there doesnt really seem to be an effective antivirus solution because, even though malware exists, it’s so fucking sophisticated and stealthy you may never know it.

        • Honytawk@feddit.nl
          link
          fedilink
          arrow-up
          1
          ·
          10 days ago

          it’s so fucking sophisticated and stealthy you may never know it.

          Even more reason to install an AV on Linux.

          It is the whole point of an AV to prevent malware the user doesn’t notice.

          Almost every malware tries to be invisible to the user. Because if they aren’t, they would be wiped off instantly. This goes for every OS.

          • krooklochurm@lemmy.ca
            link
            fedilink
            arrow-up
            1
            ·
            10 days ago

            There dont seem to be any particularly effective ones.

            In my experience malwareis just so different in linux tho, like. Malicious udev rules, bpfdoor, that ssh things hears ago that allowed someone to basically eavesdrop on anything that was right there in the code.

            If someone manages to get something malicious running on linux it’s a different ballgame from wjndows - theres so much bash everywhere that can be modified to do nasty things.

            Im not saying an antivirus is a bad idea on linux or anything - but there really doesnt seem to be anything decent.

            Clamav seems like the only game in town. And i have nonidea how effective that is anyway

  • pseudo@jlai.lu
    link
    fedilink
    arrow-up
    6
    ·
    12 days ago

    At a time I didn’t have wifi, I would not share connection with younger guests. There was no way I would use my phone to connect to internet the bloody smart tv in the heart of our share living room. Never done it in my life, so I was not lying when I saied I didn’t knew how to do it. If you Come to visit me, visit me not my game console or my streaming service.

  • xxce2AAb@feddit.dk
    link
    fedilink
    arrow-up
    171
    ·
    12 days ago

    “Are you nuts kid? We don’t use wifi around here. I unsoldered the antennas of my router, just in case.”

  • mlg@lemmy.world
    link
    fedilink
    English
    arrow-up
    16
    ·
    12 days ago

    wth is the point of a guest network if you have 443 blocked lmao.

    Even my VPN port is 443 so it gets past basic port filtering because HTTPS is usually the only one allowed compared to other protocols.

  • blinfabian@feddit.nl
    link
    fedilink
    English
    arrow-up
    11
    arrow-down
    1
    ·
    12 days ago

    what a dick move tbh. i get ya wanna be secure, but why not just let him do his thing on that alternate network?

    • nibbler@discuss.tchncs.de
      link
      fedilink
      English
      arrow-up
      17
      ·
      12 days ago

      guess this is satire. zero trust and byod mix well, just isolate from your shit and you are done. block port 25 outgoing and known c2 IPs to not taint your IP.