> I've been on university systems that use a hotel-like system. On the > first connection on port 80 to any address, one is directed to an > authentication page. All access is blocked to any address on all ports > until that authentication is given. Which means an attacker simply sits on the network waits for someone to authenticate and then takes on their MAC address. Alan