> I've been on university systems that use a hotel-like system. On the > first connection on port 80 to any address, one is directed to an > authentication page. All access is blocked to any address on all ports > until that authentication is given. Which means an attacker simply sits on the network waits for someone to authenticate and then takes on their MAC address. Alan -- fedora-list mailing list fedora-list@xxxxxxxxxx To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list