I propose a new term for the activity of visiting restaurants/cafes (individually or collectively) to detect/evaluate their wireless connectivity: WarMunching!
Full disclosure: No Big Macs were harmed in the course of this research. How to tell if a McDonald's has wireless access (other than wardriving by or warchalking, which might get washed away nightly): look for a little sign outside with a McDonald's logo styled like an at sign. Or see the AP lists at: http://www.mcdwireless.com/ Location: Half Moon Bay, CA, Highway 1 Wireless provider: WayPort (may be different at different locations) SSID: Wayport_Access Type: Captive Portal Redirect URL sampler (MAC address cloaked): http://nmd.mcd07221.sjc.wayport.net/cgi-bin/mcd_redir.cgi?IpAddr=63.81.35.1 33&MacAddr=de:ca:fb:ab:e1:f1:5h&PortType=Wireless&NmdId=1365&origDest=http: //www.bawug.org:80/&NduMacAddr=de:ca:fb:ab:e1:f1:5h&PortDesc=AP1&Port=1&Ret urnHost=nmd.mcd07221.sjc.wayport.net&pageDesc=coupon http://amenity.wayport.net/use_coupon.adp?IpAddr=63.81.35.133&MacAddr=de:ca :fb:ab:e1:f1:5h&PortType=Wireless&NmdId=1365&ReturnHash=7c1cf27dfa43c7a48d0 5af9d218929ee&ReturnHost=nmd.mcd07221.sjc.wayport.net Signal strength: 3 out of 5 dots on iBook/Airport with built-in antenna in parking lot. Connectivity: "up to 50 times faster than a standard dial-up connection," according to the flyer. Didn't do any benchmarks. Flyer title: "Bites or Bytes. We do both." How much does it cost (info NOT on the website, perhaps so they can try different models at different locations): at Half Moon Bay, $4.95 for 2 hours with WayPort prepaid access (credit card via captive portal), or buy a Big Mac Value Meal ($5.25) and get a coupon code good for 2 hours of access. Another way to look at it: buy 2 hours of access, and for another $0.30 you get 2 hours of food and drink (if you eat slowly). Or, you can use existing WayPort or partner accounts: According to the flyer at the register, MCI, AT&T Wireless, iPass, Boingo and GRIC. "If you are a customer of one of these companies, you can access Wayport's service via their software. Some restrictions apply." How well does it work: I didn't actually try using it beyond the login interface. Ironic note about the value of having a connection at this particular location: The first WLAN I saw from the parking lot was a tmobile AP from the Starbucks across the lot! Technical Support: 877-WAYPORT Flyer code: MCDR/03 McD Hot Spots -- counter zone -- tearpad Raines P.S. WayPort AUP: http://www.wayport.net/acceptableuse WayPort FAQ: http://www.wayport.net/support/faq P.P.S. WayPort Security Information and Liability Disclaimer (from the captive portal's login screen; not found on the public website; reproduced here so you can read and prepare BEFORE you inadvertently make your computer accessible via their network in some fashion): >Wayport provides public access to the internet. There are potentially >serious security issues with any computer connected to the internet >without the appropriate protection. This can be true of any connections >made through, including but not limited to, a wireless network, a cable >modem, dial-up access or otherwise. These security issues range from >viruses, worms and other programs that can damage a user's computer to >attacks on the computer by unauthorized or unwanted third parties. Third >parties, known commonly as "unethical hackers" or "crackers" may attempt >to penetrate the user's computer and download information from the user's >computer or otherwise exploit or damage the user's computer or other >computer systems. If the user has unprotected files on the computer, these >files may be visible to third parties on the Internet or Local Area >Network (LAN), potentially including parties with criminal intent. Third >parties may also exploit vulnerabilities in operating systems to cause >malicious damage to a user's computer or even a whole company's network, >up to and including the destruction, corruption, or deletion of files or >the re-formatting of drives. It is recommended that the user uses either >a personal firewall or one or more Virtual Private Network (VPN) systems >to protect this information. Wayport advises the user that he or she >should consult a security expert to determine whether there are any >potential security risks in their computer's configuration. WAYPORT >SPECIFICALLY DISCLAIMS ANY LIABILITY FOR UNAUTHORIZED THIRD-PARTY SECURITY >BREACHES OR THE RESULTS THEREOF. WAYPORT PROVIDES ACCESS TO THE INTERNET >AND THE WAYPORT NETWORK ON AN "AS IS" BASIS WITH ALL RISKS INHERENT IN >SUCH ACCESS. BY CONNECTING TO THE WAYPORT NETWORK, THE USER ACKNOWLEDGES >THE RISKS ASSOCIATED WITH PUBLIC ACCESS TO THE INTERNET OR TO THE LAN AND >HEREBY RELEASES AND INDEMNIFIES WAYPORT FROM ANY DAMAGES THAT MIGHT OCCUR. > >For your information, we have set forth some common security problems. >Please note that this list is not intended to be exclusive, and new >security risks may be continually developed or discovered. Here are some >common risks: > >Packet sniffing: >In certain configurations, every packet of information on the internet can >be intercepted or "sniffed" by a third party. In the case of a wired >network connection at a Wayport facility, the packets are on a switched >network, provided that the user is using only equipment or network >receptacles provided by Wayport. This prevents packet sniffing on the >Wayport network. However, in a wireless connection using IEEE 802.11b, >IEEE 802.11a, or IEEE 802.11g wireless (commonly known as Wi-Fi), packets >can be "sniffed" by someone on the wireless network with the appropriate >software. This allows the third party to obtain every piece of information >that the user sends across the network. There are two precautions that you >can use to protect your information. > >1) Do not send any sensitive information including passwords, credit card >or other sensitive information using a wireless connection. > >2) Use a Virtual Private Network (VPN) with strong encryption. VPNs >encrypt all of the information sent by the user to the termination point >of the VPN, so the information is, by practical means, useless to a third >party. > > >Net Bios: >One of the most dangerous problems with internet access is Net Bios >access. This is a serious security risk that can enable third parties to >obtain, modify, erase, or "scan" every file on your system. Net Bios, >typically, runs on port 139. Wayport blocks this access of this port from >outside sources, but within the property from which you may be using the >Wayport access, Net Bios cannot currently be blocked locally while still >and allowing some systems to function properly. This means that someone >could be on the property scanning your files. Net Bios is required for >certain useful things such as file sharing and network printing, but you >can take advantage of these features without opening a security risk. >There are several things that you can do to protect yourself against this >attack. > >1) Turn off file sharing. If you have file sharing turned on, then other >people on the network can view the files on your computer. > >2) Encrypt or protect sensitive files. Many programs offer the ability to >password protect the file before opening. If a third party is able to get >access to these files, then he or she may not be able to open the files >that have been encrypted or protected. > >3) Disable Net Bios enabled programs. There are some programs that enable >Net Bios that are not required for common use on the internet.. We >suggest that you check with your company network administrator or security >expert first, so that he or she will be able to specifically advise you on >this matter and will be made aware of a change in settings that you are >effectuating. > >Note that security on the internet is a rapidly changing landscape. New >attacks are springing up all of the time. Wayport recommends that you >consult with your company's security experts to ensure that your computer >is protected when you are on the internet. Note that these security risks >exist not only on public access networks provided by Wayport, but also on >any LAN or any internet system such as a DSL,Cable Modem, or other >connection in your home or office. The suggestions given herein are >provided as a courtesy, and do not replace specific personalized advice >provided by your network administrators, company computer security >personnel or other security experts with whom you may be working. WHILE WE >HAVE ENDEAVORED TO BE ACCURATE AND TO PROVIDE INFORMATION FROM SOURCES WE >BELIEVE TO BE ACCURATE, WE DISCLAIM ANY OBLIGATION TO UPDATE THIS, AND WE >WILL NOT BE RESPONSIBLE FOR ANY DAMAGES YOU MAY INCUR, INCLUDING FOR >SPECIAL OR CONSEQUENTIAL DAMAGES OR LOST PROFITS (WHETHER FORESEEABLE OR >NOT) BY RELYING ON THE ADVICE HEREIN. -- general wireless list, a bawug thing <http://www.bawug.org/> [un]subscribe: http://lists.bawug.org/mailman/listinfo/wireless
