Chad Walstrom wrote:
> What about a capture portal based setup?  She connects with her
> machine and must register/log in via a website.  That application can
> regulate routing rules based on user account and do time limiting,
> etc.

Hmm...  You'll have to be careful about blocking other protocols as
well.  She could probably open up a promiscuous nic and sniff out valid
IP addresses.  I hope she does. ;-)

-- 
Chad Walstrom <chewie at wookimus.net>           http://www.wookimus.net/
           assert(expired(knowledge)); /* core dump */
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
Url : http://shadowknight.real-time.com/pipermail/tclug-list/attachments/20050128/726098ff/attachment.pgp