If there were ever a place for Defensive Computing, it's at a hacker conference.
So while attending the Last HOPE conference, a number of my previous postings came to mind.
First, there was the list of available Wi-Fi networks (see below) at the conference which, at times, showed four computer-to-computer networks (using the Windows XP terminology). These networks, also known as ad-hoc networks, are not governed by a router. While they may be set up on purpose, they are more likely to be accidental creations on the part of nontechnical computer users, or a purposeful trap set by someone … Read more