First thought - push a GPO that only allows browsers to work using a proxy
on the far end of a VPN. But if the hotspot requires user intervention of
some form to gain access, then no good.

Second thought - disable javascript in your browser.

Third thought - set the cache/cookies/etc to auto-clear every time you close
your browser, similar to the 'in-private' mode of IE. Still potentially can
infect during the session at the hotspot.

Fourth thought - SSL authentication to the captive portal.

...just off the top of my head.




-----Original Message-----
From: [email protected]
[mailto:[email protected]] On Behalf Of Drew
Sent: Thursday, February 04, 2010 5:23 PM
To: SoCalFreeNet.org General Discussion List
Subject: [SCFN] How Wi-Fi attackers are poisoning Web browsers

Anyone have any insight or experience with this? 

http://www.networkworld.com/news/2010/020310-black-hat-wi-fi-attackers.html

_______________________________________________
SoCalFreeNet.org General Discussion List To unsubscribe, please visit:
http://socalfreenet.org/mailman/listinfo/discuss_socalfreenet.org


_______________________________________________
SoCalFreeNet.org General Discussion List
To unsubscribe, please visit: 
http://socalfreenet.org/mailman/listinfo/discuss_socalfreenet.org

Reply via email to