On Fri, 24 Jun 2011 09:47:39 -0400, LouB <Lou@invalid.invalid> wrote:
>However the reason for the post is that I visit many different homes and
>have to live with different routers.
Ok, you're forgiven, this time only.
>Yes some are easy, BUT for many if
>anything was written down it is now lost or the person who set it up is
>not available. Many clients are 70 or older and are barely able to
>power up the machine:-(( In a nutshell I guess I am screwed <VB sigh>.
I pay about $30 to $40 for a new wireless router. That's about 30
minutes of my time. If I can't deal with their router, I sell them a
new one. If you're worried about losing the connection because of a
PPPoE password, then try the setup with a new router and see if you
have a chance. If it won't play, then walk away due to lack of info.
That usually gets the customers attention and the info should
>The company advises us to use a wired connection and we often do, but
>that puts the phone near the computer and the client wants it somewhere
That happens. I carry a roll of CAT5e, RJ45 connectors, and a T25
stapler. The hard part is where I have to drill through the floor or
wall. The worst problems are houses with babies and puppies, that
like to chew on the cable.
If the customer doesn't have the WPA/WPA2 pass phrase, you still have
the wired option. However, that might be tricky if they're "leaching"
off the neighbors, or using a community wi-fi system.
Sigh. There are system for recovering the wireless password by
sniffing. WEP is easy. WPA/WPA2 is possible, but only for fairly
short pass phrases. Start here:
While this might work, I don't think your employer will allow you
enough time to use this method, and will probably not want to deal
with the potential legal exposure.
If you have access to their client computer, it might be possible to
extract the password from the registry if the customer gives you
access to their computah:
If you need a toolkit for such nefarious activities, I suggest Cain
Note that most virus scanners will declare this (and others) to be
evil-ware, and try to remove it. You'll need to create exeptions.
There are also "live CD" distributions, that have all manner of
wireless hacking tools included.
I recommend Backtrack:
Welcome to the dark side...
>FYI here is the device: https://www.captioncall.com/captioncall/
Nice and paid for by the FCC. I don't see why they need this when a
broadband internet connection is required, which implies that they
already own a computah. They could just use any chat program. I have
a nearly deaf relative that uses Skype for voice and chat quite
effectively. I'm guessing the phone is a conventional POTS line,
although you could plug it into a VoIP FXO/FXS box. Do you need to do
port forwarding in the router in order to make the display work?
Jeff Liebermann email@example.com
150 Felker St #D http://www.LearnByDestroying.com
Santa Cruz CA 95060 http://802.11junk.com
Skype: JeffLiebermann AE6KS 831-336-2558