pNYCwireless SuperNodes take advantage of the WifiDog captive portal software. Want to try it out for yourself? Contact us at [EMAIL PROTECTED]
--- [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote: > 1) http://ken.ipl31.net/2006/04/02/nocat-auth-is-dead-long-live-wifidog/ > > "Nocat Auth is dead, long live WifiDog" (from a vol from seattle wireless) > > WifiDog really shines in aggreating content and making it available in > splash pages. It can take dynamic data feeds, such as geo-coded or > location based information feeds and display it to people on the > splash page. It has google maps integration and sports a monitoring > map that shows you all the status your nodes running wifidog and will > alert you if a node goes down. > In addition the fact that is designed to aggreate information feeds > means that you could feed stuff such as Itunes sharing bonjour > advertisements and display that on the portal page. > I saw it demonstrated at a session this weekend and am extremeley > impressed. I encourage anyone looking for a captive portal based > solution to check it out. > > > 2) http://ablogofherown.postopolis.com/2006/04/01/wifidog-ile-sans-fil-and- > hacking-your-city/ > > "You know, this is a really interesting product and it really needs to > be looked at more closely." > > 3) and wow - check out this one! someone (else) should add it to the > wifidog wiki (there should be a press page if there isn't already) > > http://www.enterprisenetworkingplanet.com/netos/article.php/3592556 > > > "While NoCatAuth is probably the most famous captive portal, it's not > being actively developed anymore. It still works fine, and there is an > active user community, but the devs seem to have stuck a fork in it > and pronounced it done. My current favorite is WiFiDog. It's tiny, > around 30K, and is completely self-contained with no dependencies." > > --------------------------------------- > Build a Secure Wireless Portal with Linux > March 17, 2006 > By Carla Schroder > > Ever since wireless Ethernet was born, a sizable number of folks > decided that it should be freely available to the masses at no cost. > So we have official community wireless projects, coffee shops, hotels, > and other businesses supplying free wireless Internet, and a lot of > purposefully-unsecured private wireless networks. > > Humans being what they are, admins of open wireless networks should be > canny and careful. In these modern times you can be punished for what > other people do, no matter how tangential your connection to them. > Presumably most folks would prefer not to go to jail because someone > downloaded child porn over their wireless link, or spewed forth spams, > or published information displeasing to corporate types. It's a good > idea anyway to have some controls in place to control un-neighborly > behavior, like bandwidth- and time-hogging. > > Instant Wireless Communities > There are a number of specialized applications for building wireless > portals. The grandmommy of them all is NoCatAuth. NoCatAuth was > designed to simplify and control the administration of public wireless > portals. NoCatAuth creates a "captive portal", which means users > cannot enter your network until they follow a few steps on your > NoCatAuth Web page. The lowest level of access is "Public." A login is > not required; users who wish simply to connect without hassles can > skip the login, and are then granted the fewest network resources. The > "Co-op" and "Owner" classes of members are required to login and > authenticate, and are granted more network privileges. > > NoCatAuth manages security most ingeniously. It wisely bypasses 802.1x > security entirely, which is still in a state of flux and chaos, > because lots of old network devices are still in use that support > nothing stronger than WEP, which is about as secure as putting the key > under the mat. Instead it creates an open access point, then hands off > all access controls and authentication to your nice, strong Linux > gateway. The only access controls on the NoCatAuth device itself are > provided by a dynamic iptables firewall. By offloading the heavy-duty > work to other servers, you have a lot of flexibility and power at your > disposal, and much better sec === Message Truncated === -- NYCwireless - http://www.nycwireless.net/ Un/Subscribe: http://lists.nycwireless.net/mailman/listinfo/nycwireless/ Archives: http://lists.nycwireless.net/pipermail/nycwireless/
