[isf-wifidog] wifidog development
rob at comwifinet.com
Jeu 20 Juil 05:12:02 EDT 2006
Hi Sam, All list,
re mapping: you should also make contact with Jo Walsh and have a
read of her latest post to her devlog: http://frot.org/devlog/
> 4) Node user management. This is a little more tricky. This way, if
> Smith is abusing node_1, the manager of the node could block him from
> node_1, but he'd still be able to access other nodes.
> 5) mac address blocking from auth server. This way a known abuser
> create a new user. maybe timed, so an abuse expires after a month.
This sounds interesting - yet it starts to take wifidog towards
chillispot....... many onlist discussions on this topic to be had I
Plus d'informations sur la liste de diffusion WiFiDog