On Tue, Jun 06, 2006 at 01:31:38AM +0100, Stuart Henderson wrote: > If it's some hotspot-like setup, you don't need to circumvent > anything since you already have access to the network.
You'd be sniffing encrypted traffic at that point, right? -- Darrin Chandler | Phoenix BSD Users Group [EMAIL PROTECTED] | http://bsd.phoenix.az.us/ http://www.stilyagin.com/ |

