On Tue, Jun 06, 2006 at 01:31:38AM +0100, Stuart Henderson wrote:
> If it's some hotspot-like setup, you don't need to circumvent
> anything since you already have access to the network.

You'd be sniffing encrypted traffic at that point, right?

-- 
Darrin Chandler            |  Phoenix BSD Users Group
[EMAIL PROTECTED]   |  http://bsd.phoenix.az.us/
http://www.stilyagin.com/  |

Reply via email to