Linux - GeneralThis Linux forum is for general Linux questions and discussion.
If it is Linux Related and doesn't seem to fit in any other forum then this is the place.
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Introduction to Linux - A Hands on Guide
This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter.
For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples derived from the author's experience as a Linux system and network administrator, trainer and consultant. They hope these examples will help you to get a better understanding of the Linux system and that you feel encouraged to try out things on your own.
Click Here to receive this Complete Guide absolutely free.
I have heard of instances where people steal cable TV. It seems reasonable to me to assume that it is also possible to steal cable internet, after all the cable TV company is the same as the internet company. With recent talk of IP-related lawsuits on the Web and the question of who is responsible for the content running through their wireless internet connections, I wonder if I shouldn't be equally proactive and investigate whether someone could be stealing my internet connection. I have no evidence to support this theory.
Do my concerns have any merit? Is there a simple method to detect this kind of theft?
Then they would need to tap into the physical cable or the nearest cable connection box. Either way, there would be evidence of stealing.
Such a thing would be quite possible where I live, in a very old building where I am sure if someone crawled around in the basement they could find the boxes. What I am trying to ask is, is there some way to obtain evidence of stealing? For instance, could I run some sort of software that can scan my internet connection for what other computers are plugged into it?
Look for a rough splicing. Someone who would do that is probably desperate or just stupid and would not make a professional joint. Do you have internet coming through it at all? If not, they could have simply umplugged your cable and plugged it into theirs. Lol-if they were really stupid and it is a broadband connection, they have a router sitting down there. (which I find highly improbable)
I don't think you're quite as defenseless as it seems. Basically, anyone splicing in in front of your cable modem is not going to be your problem. The cable company should be keeping track of what cable modems are allowed on its system. You also wouldn't have to worry about someone running content through this as it technically wouldn't be part of your network.
As for your LAN, I'd stick a router immediately behind your cable modem. A number of routers can restrict what MAC addresses will be accepted as valid, so you can essentially prevent someone from getting onto your network without doing a fair bit of work. MAC addresses are trivial to spoof, but there would be a fair bit of effort to find out what MAC addresses your router would accept, and since you're only using wired connections, it will be that much harder.
If you want to watch your own network, a program like nmap can tell you what IP addresses are in use and a router should have a table what addresses it handed out via DHCP.
Of course you'll need to make sure that the computers you are running haven't been cracked, but that is a different question.