2003 Jeep Wrangler Rubicon 4x4 82k Miles Clean 4.0 Automatic Hard Top Lifted on 2040-cars
Forest, Virginia, United States
Body Type:SUV
Engine:4.0L 242Cu. In. l6 GAS OHV Naturally Aspirated
Vehicle Title:Clear
Fuel Type:Gasoline
Interior Color: Tan
Make: Jeep
Number of Cylinders: 6
Model: Wrangler
Trim: Rubicon Sport Utility 2-Door
Drive Type: 4WD
Safety Features: Anti-Lock Brakes, Driver Airbag, Passenger Airbag
Mileage: 82,000
Power Options: Air Conditioning, Cruise Control
Exterior Color: Burgundy
Jeep Wrangler for Sale
2000 jeep wrangler sport sport utility 2-door 4.0l low miles!(US $12,000.00)
1997 jeep wrangler v8
4x4 sport hardtop cd audio cruise control 3.8 v6 2012 jeep wrangler 13k(US $22,400.00)
4x4 soft top black custom wheels pioneer bluetooth audio 2007 jeep wrangler 68k(US $17,700.00)
1995 jeep wrangler rio grande sport utility 2-door 2.5l
1998 jeep wrangler, no reserve
Auto Services in Virginia
Winkler Automotive Service Center ★★★★★
Williamsons Body Shop & Wrecker Service ★★★★★
Wells Auto Sales ★★★★★
Variety Motors ★★★★★
Valley Collision Repair Inc ★★★★★
Tidewater Import Auto Repair LLC ★★★★★
Auto blog
Submit your questions for Autoblog Podcast #319 LIVE!
Mon, 04 Feb 2013We record Autoblog Podcast #319 tonight, and you can drop us your questions and comments regarding the rest of the week's news via our Q&A module below. Subscribe to the Autoblog Podcast in iTunes if you haven't already done so, and if you want to take it all in live, tune in to our UStream (audio only) channel at 10:00 PM Eastern tonight.
Discussion Topics for Autoblog Podcast Episode #319
Jeep checks out the Grand Wagoneer at Wagonmaster
How to update and secure a vulnerable Chrysler Uconnect system
Sat, Jul 25 2015If you own one of the 1.4 million vehicles affected by the recent Chrysler software recall, you may want to watch this video. In it, we explain how to get the latest infotainment software loaded onto the 8.4-inch Uconnect system. The recall was a response to the findings of researchers who were able to hack into and remotely control a 2014 Jeep Cherokee through its cellular connection. Although Fiat Chrysler has worked with Sprint to plug most of the holes on the carrier side, there are still some vulnerabilities that only this latest software version can patch. Owners have three options to get the update: download it now, wait for a USB stick in the mail, or take the vehicle to an FCA dealer. Chrysler will be sending USB sticks loaded with the software update to customers. Anyone with an internet connection and a USB stick of their own with at least 4 GB capacity can speed things up by downloading the patch from the Uconnect website. We cover that process from start to finish in the video, with the final portion still applicable to those using the FCA-supplied USB stick. If after watching this you still don't want to tackle the patch yourself, you can take your vehicle to the dealer to have it done. Also note that this process is the same for all Uconnect updates, not just the one patching the exploits. Our demonstrator vehicle is a 2015 Ram 1500 pickup. The procedure should be very similar on other products with the 8.4-inch Uconnect system, with only the location of the USB port varying. Once you have the USB stick with the software on it – either after having downloaded it yourself or receiving it in the mail from Chrysler – the installation process is relatively simple. It takes about 15 minutes to perform the update; we edited out the wait in the video. To check whether or not your car's 8.4-inch Uconnect system is running the latest software, go to System Information on the touch screen's Settings page and look at Software Version. The update related to the recall is version 15.17.5. Related Video: Recalls Chrysler Dodge Jeep RAM Safety Technology Infotainment Videos Original Video hacking
In Michigan, car hackers could face life imprisonment
Fri, Apr 29 2016Car hackers may not want to mess with vehicles in and around the Motor City. A pair of Michigan lawmakers introduced legislation Thursday that would punish anyone who infiltrates a vehicle's electronic systems with penalties as harsh as life imprisonment. Senate bill 927 says that "a person shall not intentionally access or cause access to be made to an electronic system of a motor vehicle to willfully destroy, damage, impair, alter or gain unauthorized control of the motor vehicle." Offenders will be deemed guilty of a felony, and may be imprisoned for any number of years up to life in prison. The proposed legislation is one of the first attempts nationally to address the consequences for car hacking, which has become a top concern throughout the auto industry. Critics have accused executives of being slow to respond to the threats, which were first known as long as six years ago but gained attention last July when a pair of researchers remotely controlled a Jeep Cherokee. In January, the industry established an Information Sharing and Analysis Center to collectively evaluate security measures and counter breaches. But the Michigan bill isn't noteworthy only because of the life penalty prescribed; it's noteworthy for what's missing in its details. Language in the bill doesn't delineate between independent cyber-security researchers and criminals who intend to inflict harm or havoc. Under its provisions, it's possible Charlie Miller, pictured below, and Chris Valasek, the researchers who demonstrated last summer that the Cherokee could be remotely commandeered and controlled, could face life behind bars. Provisions of the legislation that prevent a person from "altering" the motor vehicle could ensnare car enthusiasts or gearheads who tinker with electronic systems to boost performance, increase fuel efficiency or add aftermarket features. In that context, Senate Bill 927 seems like the latest measure in a running feud between independent researchers, gearheads and big automakers. Car companies don't like third parties poking around their electronic systems and would prefer the researchers not reveal security weaknesses. Researchers, on the other hand, say many carmakers are either slow to fix or unwilling to repair security holes unless they're able to publish their findings.