<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=Content-Type content="text/html; charset=iso-8859-1">
<META content="MSHTML 6.00.5730.11" name=GENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=#ffffff>
<DIV>I should have mentioned this yesterday.</DIV>
<DIV> </DIV>
<DIV>If you have wireless router as part of your home or other computer system,
you can monitor the traffic in a primitive way by watching the port
activity indicators on the router.</DIV>
<DIV> </DIV>
<DIV>For example, if you are the only one in your home that should be going
through the router at a given point in time, but the router indicators
show activity on more than one port, your router is being used by someone
else.</DIV>
<DIV> </DIV>
<DIV>Sometimes this extra use maybe is just someone who has found your Wi-Fi
connection and is just using it more or less innocently to access the
internet. The main downside of this kind of activity is that part of your
bandwidth is being used. This may not be a problem unless you are
uploading or downloading large files.</DIV>
<DIV> </DIV>
<DIV>The problem with an unknown user on a private wireless router is that the
intention of the unknown user cannot always be immediately ascertained.
When an extra port is apparently being used, a cautious person therefore
will either disable all router ports except the one they are using (if this is
possible with a given router) or turn the router off for a period --
inconvenient but maybe not as inconvenient as suffering a successful hack.</DIV>
<DIV> </DIV>
<DIV>W.</DIV></BODY></HTML>