I can recall numerous examples of where someone set up such an ad-hock network at a computer conference, harvested email logins and passwords, and used them during one of the security seminars on one of the following days.

Sobering for some to look up at the projector screen up front and see their email address and the first and last characters of their password...


I work for the Department of Redundancy Department