Harry D . Corsover wrote: > How does this relate to what we're talking about? I think some of our > analogies are getting pretty far afield from questions of tapping into > someone's wireless network without their knowledge or permission. I'm a stickler for ethics myself, but here's my problem with those of you, especially you Harry, who try and put the oneous on the 'visitor' instead of the site maintainer; how am I, the visitor, supposed to tell the difference between an intentionally open public signal and one that is open because the owner did not take basic security steps? Why is his negligence my problem? I don't know he didn't intend for this to be a public access site. They are poping up all over the place. Am I supposed to research each one to make sure it was *intended* to be open and public? -- J.C. Webber III Technical Lead, Unix System Administrator jcw at kingoblio.com www.kingoblio.com Please, if you use Windows, do not add my address to your Address Book. I do not wish to be spammed or have my email address hijacked by a virus and used for fraudulent purposes. Thank you. If you use a Mac, never mind. Mac's don't get viruses.