Chad Walstrom wrote: > What about a capture portal based setup? She connects with her > machine and must register/log in via a website. That application can > regulate routing rules based on user account and do time limiting, > etc. Hmm... You'll have to be careful about blocking other protocols as well. She could probably open up a promiscuous nic and sniff out valid IP addresses. I hope she does. ;-) -- Chad Walstrom <chewie at wookimus.net> http://www.wookimus.net/ assert(expired(knowledge)); /* core dump */ -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: Digital signature Url : http://shadowknight.real-time.com/pipermail/tclug-list/attachments/20050128/726098ff/attachment.pgp