I've actually seen the exact opposite. A client of ours came into our offices. Their laptops were configured to use our wireless networks, but hardwired to use the company's internal proxy server to access anything via Port 80. As a result, we could not get them on past our internal captive portal. We shut it off for them (and turned it back on the very next day).
On Thu, Dec 27, 2012 at 9:41 AM, Robin Wood <[email protected]> wrote: > Hi > I was talking to a friend who was saying that his laptop is set up so > all his traffic is sent over a VPN back to his company network and > that he uses it from round the country on hotel networks. Most hotel > networks I've used have a captive portal where you at least have to > tick a box to say you agree to the Ts&Cs. If he is doing that then I > surely there is a short period before the VPN is brought up where the > device is on the hotel network and then the internet. > > This short period would give enough time for any apps which call home > to have made their connections and potentially have been owned by Evil > Grade and anything else running which is trying to get out to make a > connection. > > Has anyone seen a way to stop this short window of opportunity but > obviously still allow the user to connect to the captive portal and > authenticate? > > Robin > _______________________________________________ > Pauldotcom mailing list > [email protected] > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > Main Web Site: http://pauldotcom.com > -- Dan McGinn-Combs [email protected] Google Voice: +1 404 492 7532 Peachtree City, Georgia USA
_______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
