Having to find multiple levels of internet access — oh, fun!

Disclaimer: I am musing on the challenges I faced while trying to secure reliable internet I required during a recent set of business trips, and the process of developing various solutions to these challenges. These challenges are, in a general fashion, typical of the routine logistical challenges I face when in-the-field, and no doubt of other field technicians. In no way am I trying to reflect negatively on my employer, who for the purposes of this entry shall remain nameless.

I was recently on a couple of business trips, depending on an iPad as a critical part of the execution of the contract. This trip was to a small city of 25,656 (according to Wikipedia), big enough to have plenty of internet access points, cell phones, and cell phone data. As far as I was concerned, in fact, I was in a mini-mini version of Montreal, home for me, to those who haven’t figured it out yet.

The way the iPad is set up, wifi internet access is required to transfer building plans needed to do the work to the iPad, and transfer back files and data collected from my field work. I have made no bones mentioning to some key people heading the overall project that this is a potential Achilles’ Heel to the execution of the project, since, at least in the overall project’s fringe locations sufficiently beyond population centres, internet access would be a spotty luxury at best. My trips were at least symbolically close enough to the edges, underlining the potential problem.

One of the first challenges I found was that the iPad didn’t seem to play well with the internet supplied in the motel (DataValet); although I did manage to get it to work once, it proved a bit too frustrating to get working reliably. A colleague confirmed that he’d had similar problems getting Apple products to connect to DataValet. I had no trouble getting my personal computer running Fedora 21 Workstation to work with DataValet: In fact, besides not recalling having trouble over the years connecting to wifi that wasn’t specific to Linux or Fedora, I would actually say that the experience was even easier than in the past, since the daily leases seemed to automatically renew, although it seemed to insinuate itself by a “convenient” automatic popup window. In parallel, my work Windows-based machine also worked flawlessly throughout with DataValet, although if I remember correctly, I may have had to occasionally open up a browser in order to renew the leases.

Add to this challenge, my employer’s local office didn’t seem to have wifi, or at least, assuming that it *was* there as a hidden network, my work computer didn’t automatically connect to the corporate wifi when not plugged in to the corporate network, which it normally does at my home office.

My first solution was to fulfill a purpose of my having asked for a company smart phone in 2014: Create a hot spot using the data plan on my work phone to do data transfers when not in a wifi zone that works well for the iPad. However, it seemed, between the picture-heavy data and the fact that the iPad seems to do automatic background backups when hooked up to internet — a feature to which I initially had a (negative) knee-jerk reaction that nonetheless actually was useful at one point and since — my phone appeared to run out of my data plan for the month, as evidenced by the sudden stop of internet connection through the phone while still operating just fine as a phone. Having quickly checked the phone’s data usage logs and determining that I’d certainly gotten to the neighbourhood of the limit I believed I had (2 gigs), I assumed that the phone’s contract had a limit set by my employer to turn off the data plans until the month rolls over in order to avoid overage charges. I later learned, upon my return home and standing in front of the IT tech responsible for the corporate cell phones, that the problem was presumed to be an unusual set of settings probably set by some esoteric app (of which I have have very few, esoteric or otherwise, on my work phone), or possibly a SIM card problem, which turned on off the phone’s data capabilities, and that in any case the company has no such policy to ask the cell service provider to turn off a phone’s data access when it reaches the limit of “included data” in the plan, until the rollover date. The lack of internet on the phone is “solved” by resetting the phone to factory settings; I should get instructions on how to do it in the future should I be faced with the problem again. 🙂

This led to a second solution: I used my personal phone to create a hotspot and consumed a bit of my personal data plan, which didn’t bother me too much, at least until it were to involve overage charges. Not that I checked, but based on the little amount of time I used it, I’m sure I never got into that area.

The next solution also created another challenge due to a flub on my part: My client finally gave wifi access to the iPad at her various locations; however, I should have requested that she also enable my work computer, since I had a secondary need for internet given that I developed a need to produce or modify extra plans several times once arriving at some sites, and as such a need to transfer the plans off the computer and onto the iPad.

Finally, I realized that when I have wired access, I had yet another solution available to me: I could set up my linux laptop to create a wifi hotspot. This was rather easy, at least under the current gnome version in Fedora 21 and I believe has been for quite a while under the gnome 3.0 series, and probably before too. Unfortunately, this was wasn’t a solution at the motel since it only had wifi and no wired access, and I didn’t have an external wifi receiver with a cord to provide the wired internet and free up the wifi card.

Here are some screenshots of how easy it is to setup a wifi hotspot under Gnome 3:

step 1

step 2

step 3

step 4

step 5

Feeling a bit curious along the lines of “shouldn’t this be relatively easy under Windows, too?”, I checked on my work computer, and while it seemed possible, and indeed my brother once did it for me with his Windows computer, it was not obvious at all; in fact, I gave up after about four or five click-throughs with little end in sight.

Hence, at the local office and having set up my laptop to create a local wifi hotspot, I’d created a mildly-amusing-to-me setup on my temporary desk, plugging in my personal laptop to the corporate network, running a hotspot using its wifi card, and using my work computer normally over wifi as well as doing data transfers from the iPad.

Back at home and at my home office, I mention my difficulties in getting internet access to my supervisor (who isn’t a computer techie type), who thought that creating a hotspot under Windows couldn’t be done, or at least he didn’t realize it could be.

Further discussing this with him, I explained the situation saying “I don’t mind trying to find other solutions — that *is* my job — but after not having two A Plans (the motel internet not working for the iPad, nor having wifi at the office), then suddenly not having a plan B (the company cell phone internet not working), having to depend on my personal phone’s data plan, then having to depend on the client’s internet access but not having enough access for all devices, and finally coming up with a part-time solution to replace one of the A-plans — using a second of my personal resources in the form of my personal laptop — there’s a problem here,” to which he agreed.

Jovially, he did however suggest that “in the next leg of your travels, I happen to know that if you can go to the local library, they have free wifi”. This made me realize that if necessary and if possible, I could also try the free wifi at the local Tim Hortons (a popular Canadian chain of coffee and doughnut shops), assuming that there is one in the remote town where I’ll be visiting next.

Which has me really thinking about the problem:

– not all the field techs in the company have smart phones with data plans, and as such not able to create a needed hotspot in order to enable the execution of a project;
– not all the field techs have personal smart phones with a data plan, nor should field techs in general be required to use their personal data plans, let alone go into overage charges, in order to enable the execution of a project;
– at least at first glance, it doesn’t seem to be a quick and easy thing to turn a windows machine into a hotspot in order to enable such work — and I don’t want to hear from the peanut gallery on this one, since I *know* that it *can* be done; my point is that at first glance, even a moderately savvy user such as myself shouldn’t have to say “It’s easy under Gnome 3, why isn’t it about as easy under Windows? Boy it’s a good thing that I had my personal laptop with me!” (On a side note, usually the stereotype is that “Windows is easy, and Mac easier, but isn’t Linux hard?” 🙂 )
– and, only a limited number of computer users are using Gnome 3, where it is easy to set up a hotspot if you either have a wired connection to the internet, or two wifi cards on your computer. (I’ll have to check with my brother, who uses XFCE on one of his laptops, which is on a technical level identical to mine, to see how easy it is under that desktop; obviously, it’s technically possible; I imagine it’s just a question of how easily different desktops enable the functionality.)

Which leads me back to the above-mentioned problem of “what do you do in remote, small villages where you don’t have a corporate office with wifi, motel / B&B internet access is spotty at best, there’s no cell phone coverage, and there are few if any public wifi spots like a restaurant or a public library?”

I just hope that the library’s free wifi isn’t provided by DataValet. 🙂

Free PDF splitters, and other crippleware

Yesterday I downloaded a PDF splitter to use on my MS computer at work. And I got bitten, hard. I wouldn’t exactly call it crippleware; most people expect even crippleware to be minimally useful. This piece was not.

I shall quote the message that I sent to their support email addy:

I am writing to let you know that your free trial download for the PDF splitter is not a useful piece of software at all, for the simple reason that it intentionally and flagrantly renders the split documents useless by inserting the “watermark” — a large message spanning the diagonal of the page, in cherry red characters, saying “in order to remove this message please visit our website” — across every page of the document.


Were it to put a far more discreet message along the top or bottom, this might be tolerable however ugly it would be; however, it is hardly of any value to anyone wishing to take advantage of the “15 free uses” or somesuch in order to evaluate the software before deciding to purchase it; in fact, I expect that most people downloading the evaluation copies are immediately turned off by this malfunction.

Obviously, I don’t expect a response from them, at least not a useful response. Obviously, I would never have bought the software to begin with were I to have had a good experience using the software — I admit it, I’m cheap.

And sure, I should have thought things through a bit better and (as I mention below) install Ghostscript to do the job. Sure, I was in a bind and embarrassed myself and my employer in front of the client.

So of course, the following reactions come to mind:

– What, the programmer(s) wanted to show off their skill at insering “watermarks”, and that are ugly to boot?
– Or did the programmer or company put more thought into the dollar signs floating in front of their eyes than, oh, I don’t know, producing a piece of software that someone may actually wish to buy?
– Or did the Marketing Department convince the programmer’s supervisor that the watermark had to be put in?

And on a personal level:

– I should install ghostscript and run:
“gswin32c -sDEVICE=pdfwrite -dNOPAUSE -dQUIET -dBATCH -dFirstPage=m -dLastPage=n -sOutputFile=out.pdf in.pdf”
– I should stop trying to delude myself that there won’t be an ever increasing number of useless PDF tools out there that require you to buy the product before getting a true evaluation copy;
– When using my work computer, stop using a Windows mentality, and apply a thing or two that I know how to do under linux.

Of course in the short term, what I did was speak with the secretary very nicely, who has Adobe Professional to split the file, and she did.

My point should be clear: If you want to sell your software, go right ahead; I won’t be buying it anyway. And if you want to give away a trial period during which people can, well, try the software, go right ahead; I may try your product during the trial period. But why give a free trial period (in the case above, 15 operations) that reflects poorly on the company and actually annoys your potential customers?

Google Maps seems to need to learn that some streets go East AND West

I think that Google Maps is overlooking a basic function: In the real world, people sometimes go east, and sometimes go west.

Yesterday for the third time in a couple of years I relied upon Google Maps for directions and was sent to the wrong place. Caveat Emptor strikes again.

In Montreal, east-west streets which bisect St. Laurent Boulevard (which, no surprise, goes sort of north-south), start their numbering in both east and west directions from there. Hence you can have two equally valid addresses on a given street, given the proviso that one is designated as “East” and the other “West”. (Hey! It’s Captain Obvious!)

Fortunately, the address I was looking for was 151; during an hour of going around the neighbourhood looking for parking around “151 Laurier” (East as proposed by Google Maps), I found out that that address wasn’t a dépanneur that sells a huge variety of microbrewery beers, and looked like it never was, and finally decided to go further down the street looking for similar businesses. I suddenly had a V-8 moment and realized “Ooops what about 151 Laurier WEST?” I high-tailed it in the opposite direction and found the business in question. And to my disappointment, they were out of the particular beer I was seeking — Weizenbock, by La Brasserie Les Trois Mousquetaires, which has replaced my previous definition of ambrosia, Trois Pistoles by Unibroue.

Twice before I have had similar experiences:

About a year ago, while in Western Canada in completely unfamiliar territory on a business trip, I had looked up a client’s address, and not knowing about any local east/west splits that addresses on the Trans-Canada Highway may have in that locality, I tried to find the address, on the east end of town, that Google Maps had provided; I was about 45 minutes late by the time I finally managed to suspect that my client’s address was a “West” address and got there.

And just to quash any participant in the Peanut Gallery out there about to say “Aha well when using Google Maps you should know that in such cases they’ll always send you to the East address, so be sure to always check both!” a couple of years ago I had looked up a local address for client, and Google sent me to Gouin Boulevard West here in Montreal, a solid 45 minute drive away from my client’s Gouin Boulevard East address.

Now the Peanut Gallery may have a point: In the real world, people sometimes go east, and sometimes go west. And when it comes to using a free online service, you get what you paid for. As such, when looking up an address on any online service, one should notice “Hmmm this is an east-west street which may bisect such and such a street and as such have East addresses and West addresses; I should specify both east and west in my address search.”

But I wonder how many other people place enough faith in Google that under such circumstances — such as when they don’t know that there’s an East and West of a given street — they would reasonably expect in the case that a street has valid East addresses and valid West addresses (and likewise for North and South addresses) that Google’s response page would come back with “Did you mean (A) 151 Laurier East, or did you mean (B) 151 Laurier West?” Certainly Google seems good enough at asking such a question when you slightly misspell a street or city name, or decides that it doesn’t recognize the address you supply and provide you with half a dozen options, as often spread across the country as spread across the city.

Cool (or mundane) computer trick impresses co-worker

I managed to impress someone at the office this week with a cool (read mundane) computer trick.

I got a call from the secretary, who is a few seconds’ walk from my desk, asking for a scanned version of my hand-written signature. I replied that on my computer at home I have it, and I could easily get it within a few minutes; she replies that it would be faster for her to just walk over with a piece of paper for me to sign, which she would then scan and play around with.

And this is where I began to impress her: By the time she got to my desk with said sheet of paper, I had already VNC’d into my home server’s desktop and was in the process of doing the same from the server to my main computer’s desktop (gotta finish the process of giving it a static IP and setting it up so that I don’t have to go through my home server. 🙂 ) I finished logging into my desktop, and looked in the likely directory, and voilà ! I fired up my home email client, and within a couple of minutes, she’d received my scanned signature.

Beyond the fact that the Gnome desktop is set up standard to do VNC — and the fact that I installed TigerVNC instead of using the standard Gnome Remote Desktop Viewer — too bad that I can’t really claim that this is a cool Linux trick, since my computer at work is Windows, and you can set up Windows boxes to “pick up the phone” too ….

She was still impressed, though. And it took about as much time as the whole process of signing a piece of paper, scanning it, cropping it, etc.

FTP clients and Windows

This week I had what I consider to be curious experiences with others regarding ftp.

I’m what I would call old school; I started using ftp about 15 years ago when the internet was barely, if at all, entering the greater public consciousness, and the piece of software I had access to, gFTP, wasn’t chargeware. Way back when, Windows didn’t even have its own integrated network stack, let alone effectively having integrated ftp abilities in Windows Explorer.

Then Windows and the Vice President came along and claimed to have invented the internet :), and people use drag & drop the way you can between two directories in a gui. I have never done it this way. Ever. Even the first time I asked IT to set up an ftp site for me for a work project, I naturally downloaded and installed FileZilla after immediately finding their instructions on how to do it through Windows Explorer confusing. So the Windows way is completely foreign and confusing to me.

The first curious experience was when I, probably naively, sent out an email to a bunch of co-workers who have access to a corporate ftp site for download of files resulting from field work, such as photos. I said that if people were having difficulty transferring files using the “windows” way of transferring files, that they could use Filezilla. The response from the project manager was “Why can’t we do it directly?” Simple response, “apologies for the confusion, just in case the way IT described it doesn’t work, here’s another way to try to directly do the transfers.” Again, I became aware that I was probably naive in presuming that the “windows” way may or may not work once outside the corporate IT network — why wouldn’t it? I just checked using the windows machine down the hall on my home network, and of course I was wrong and it works.

But I found the reaction curious anyway; maybe I was taking it too literally, but I found the “why can’t we do it directly?” part curious since I was proposing an alternate DIRECT way of doing things.

The second curious experience was more concrete. A co-worker was beside me, and we’re discussing the contents of the FTP site. I fire up FileZilla, and they ask me what I’m doing. I carefully respond; they say they’ve never seen it done that way, and it looks confusing. My turn. I explain “I’m starting up an ftp client. Here are the files on my computer on the left side, here are the files on the ftp site on the right.” “oh really? That must be a new way.” (harumppphhhh.) “Uhm, I’ve been using ftp clients that look this way for the past 15 years.”

I didn’t continue into a tyrade about how Windows has people brainwashed into thinking that they way to do anything on a computer is the “Windows Way”.

Sheesh, I don’t know how to fix my car when it breaks down. Doesn’t mean I don’t have an idea about what it looks like under the hood.

ASP and Windows centric web pages slow

I am at another hotel on business. (Ho-hum, they have a password, I don’t care at this point to find out how long it’s been in place, I’m sure it’s good odds that it’s been a while. Shall we say that it’s named after a good ship. I suppose I could be wrong.)

Surfing is, often enough, slow. A good number of pages hang and time out. At first, I don’t notice much because the main one I visit is always slow, always hangs and occasionally times out.

At first I was wondering if it’s because I’m in a hotel using their internet — you know, bottlenecks due to lots of people using the internet hookup at the same time (what, at 6AM?), people setting up repeaters in the bushes stealing signal because there is an insecure password that at worst would cost them a night’s stay to figure out, etc.

I also have the company laptop with me, to do company work (of course, I have my own laptop to do personal stuff, the company policy on personal usage of the computers is getting to be much like closed source licences that make you wonder whether you may use the software at all, even for its apparently intended purpose.) It uses windows on a Centrino Core 2 with something like 2.8GHz or more. For the fun of it I type in le web page du jour. It loads quite speedily, while the page load on the same web page on my F11 ACER Aspire One is still hanging.

And I notice something interesting: le web page du jour is in ASP. So is the historically slow site. Last night the site that was impossible to properly log into using my laptop, the work email server — such that I logged into my own web email to send the message to the home office — is, you got it, on a windows server. A fourth site this morning timed out in the middle of a survey I agreed to take; I hope it’s a linux server, it’s for a magazine I subscribe to on a little topic called linux (the publishing house also has a PC magazine, so go figure.)

I’m wondering: Am I having difficulties with these pages because I’m using Firefox? Linux? A slower machine? Is it Fedora’s implementation of Firefox 3.5 Beta 4 or whatever? Some combination of the above? Is this an ASP compatibility problem? Or an ASP discrimination problem? Or are the pages in question themselves biased against non-windows computers? Or non-IE browsers? (Never heard that one before!) (here’s my archive)

À suivre …

The new Google OS

Well for those of you who haven’t heard, internet darling Google announced in the past day or two that it will be releasing a new OS expected in 2010 (here’s my archive).

I had a few reactions:

– Google getting headline news should make it interesting, and they have the money and clout to be a real competitor. I saw the news about the new Google OS by watching the morning news and one of the taglines was “Google to launch operating system”. Sorry, Ubuntu only gets headline news within the likes of gearheads like me (see below), and it’s a footnote at best when people talk about that South African Space Tourist.
– What will “it” be? Linux? Google-Hurd? Open-source? GPL? BSD-licence? Apache Licence?
– I wondered what it would be about. Goobuntu? Ahhh, it’ll be an internet-centric linux distro — meaning, even though it’s obvious that it’s meant to be a MS-killer on the netbooks (with the possibility that it could be released, with appropriate changes, for the desktop too), its main comparison will be gOS. (Insert tongue firmly in cheek here. Then bite.)
– It’ll only have any way of working if it A) deals with the problems Fedora has out of the box (flash, mp3, avi, DVD, etc.) by no doubt including such support out of the box, and generally be AS GOOD POINT FOR POINT as MS, and then some, and B) do something better than MS — and be something that people want.
– It’ll have to likely change the computing paradigm. The cloud computing paradigm has been touted for about seven years or more now and has only been taking off in the past year or so. Google has been slowly eroding MS with things like gmail and google docs, alongside Firefox and OpenOffice.org, and generally contributing to opensource and other projects, but I’m wondering when the breakpoint will be when suddenly EVERYBODY drops MS and goes somewhere else, or rather the pie becomes properly split up such that what’s under the hood matters less than what goes on on the screen. Oh, and people don’t like change. Resistance to change is one of Open Source’s, no scratch that, “any alternative to MS”‘s biggest enemies.
– My original take on the above was that Google *would* be the people able to push things beyond the breakpoint.
– I’m wondering if it will have to go on par with MS by pulling a Novell to integrate MS-files nicely.
– Ahh, “machines with it will be sold starting in 2010” — it was but also wasn’t as specific as that … will there be a slice in it for Google? Or will there given away the way other distros are, but have insidious settings that encourage the user without realizing it to go to some web page that has google click ads? Or … what’s in it for them?

Then of course, I’m listening to one of these “deal to the lowest common denominator then add 2 points of intelligence” syndicated talk radio hosts who’s got a guest talking about this subject. To set the stage, the previous topic he discussed was a videoclip on YouTube of a person using both hands to shave his head while driving and whether there should be a law against such a thing, which he caps up with the likes of “there should be an anti-moronification law against such morons.”

To be fair, the stance he and his guest take is targeted at most people who inexplicably (to me, anyway) have no clue that there *is* an (easy) alternative to MS on the PC, besides the Mac, which he rightfully puts in a class of its own. And, Linux *is* mentioned as an available alternative, but “it’s pretty much for the gearheads”.

Here’s what I sent him, I was so riled up:

*****

Forget Ontario hair-shaving idiots making the roads less safe, I wonder about those on the radio who say linux is for “gearheads”.

I suppose I’m a gearhead, I do indeed like computers for their own sake beyond the day to day usefulness they present.

However I’ve been using various versions of linux for the past several years on my PC and take great pleasure in overwriting any existing MS format on any new computer I get — over the past three years, that’s about 5 computers, formatted a few times over on some. Some are older and more archaic than the netbooks your piece mentioned, let alone today’s top of the line desktops, and I’ve been using them for desktop uses, not server applications. On them are full OS’s that are not stripped down — unless, of course, I were to have chosen one of the minimalist versions — and interestingly are not all that slow.

There are several versions which are geared toward the “average” user. Most of the more common versions can do all of the day to day uses that were mentioned in your piece and are on par with — sometimes superior to — MS. I use a version that is a cross between the “gearhead” market and day to day usage. I recommend to newcomers Ubuntu, which I do not use. Virtually all users of MS however would be able to use Ubuntu, available at ubuntu.com, with no difficulty, and it is the most popular of the linux versions and is not aimed at the “gearheads”.

I was incredulous listening to the show to hear that people still think that MS is the only option for their PCs. I suppose that the few who have heard of linux figure that something given away for free is worth the money paid for it. Au contraire, MS is less configurable and as you know virus prone as compared to linux; for the virus part, you have to pay more to get properly protected. Linux on the other hand is safer, faster, and free compared to MS.

I found your guest informative but I found the bias toward linux not being a competitive alternative on the desktop — which it has been for years — compared to Windows “very interesting”.

*****

Oh, I do think that the driver in Ontario is a complete moron. 🙂

And Mr. Shuttleworth, please note that I *will* recommend Ubuntu to the general public since the learning curve is easier than even Fedora’s.

Wireless under Fedora 11

Back in September, I cried for joy that wireless worked out of the box in F9, even if it was only 2 bars out of 4, inches away from the wireless router, and surmised that this might be due to a presumed lack of Ndiswrapper in the Fedora kernel, expecially since a plain old vanilla kernel downloaded from kernel.org gave me 4 bars. The number of bars and signal strength on my PIII 450 laptop varies from about 10% (zero bars but still connected) to about whatever 2 bars represents. On rare occasion I get 4 bars, which usually drops back down in seconds.

Under F11, things seem to be the same. No complaints.

Seems that I might not haven Fedora enough credit, if you can believe it.

On my new Acer Aspire One, I have 4 bars, all the time. And it’s about a foot or two further from the router than the PIII 450.

So it seems that it could be my card, the drivers available, and the age of the technology.

Good going Fedora!

Well Hallelujah! Big Brother has finally acted!

I just checked into a motel today that not only has a password for its internet access, and not only a good, secure password, but — get this — it was automatically generated when I checked in and asked about internet access, and that everyone gets an unique password. They told me that it has an expiry time that I could choose when I first logged on; if I mistakenly chose one too short, I just would have to call the front desk for a new one. I know it’s unique to “me” because I’m using two laptops on this trip, my company machine for company business, and my personal laptop for personal stuff, and when I tested the original password on my personal machine after having used my company machine, I was told that the limit of accounts attached to the password had been reached, so I called the front desk and they gave me another one, no questions asked.

Some would say that the unique passwords could be a violation of my privacy. Possibly, if they happened to tie the password to my room; I don’t know if they have, but in this case … well, the conspiracy theorist in me has not been awakened (I know, famous last words. 🙂 ) I suppose I’m not fond of the notion that the unique password could be used to against me, including wrongly and/or maliciously.

However, I suspect that I’m safe; hotels are generally in the business of being discrete as part of their profit motive, so keeping track of who gets which password or derivative information about my internet use is, well, not generally in their interest. Then again, perhaps I should also be worried about the key card hotels give me and whether they are keeping track of how often I go in and out of the room, or use the pool, hot tub, exercise room or laundry room protected by the key cards. Ooops, they took down my name, address, and phone number, and they have credit card information linked to me when I signed in! My privacy has already been thrown out the window!

I shouldn’t be — I figure that this should be the norm — but I’m sincerely impressed that this hotel protects its business resources much the same way they they protect the others, such as the aforementioned rooms, pools, hot tubs, exercise rooms, laundry rooms, and the like.

Hotel internet access passwords — Here’s a case for Captain Obvious

In the past 4 weeks I have spent as much time in my own bed at home as I normally spend in hotels for business over 6-12 months (about 4 nights.) As such I have been using a few hotel internet hookups.

First, the good news from Captain Obvious is that most hotels and motels in North America these days seem to have wireless internet. I know, I’ve been using hotel/motel wireless for about three years now, but now it’s so commonplace, that my experience last fall near Boston at an otherwise charming New England Inn where they used a large group of computer savvy geocachers as guinea pigs for their new wireless internet setup seems odd.

Next, to set the stage, Captain Obvious is observing that several years ago when people started getting wireless routers in their homes and offices and anywhere else, after a while people learned that they had to lock down their router with a password that nobody knows except, well, those with whom they wanted to share their bandwidth (and only those with whom they wanted to share their bandwidth), so that, well, you know, the neighbours don’t decide to save a few bucks on a cable modem and piggyback on yours. Or use so much of it that you start getting overage charges, assuming that their theft of your signal doesn’t significantly affect your use of your internet. Or that strange looking people don’t park in front of your house for hours on end for no apparent reason. Or worse yet, do so while doing things that would have the cops knocking down your door for doing things like, oh, who knows, downloading kiddie porn or spamming or hacking into financial institutions and stealing large sums of money.

Which makes me wonder about the all the hotels I’ve been staying at over the past month:

– The first one had a great, really secure password, that hadn’t been changed in over a year and a half.

– The next one used the hotel’s name with a few numbers added to the end. I don’t expect that they change it very often, if at all; I’ve used that hotel a couple of times over the past three weeks and I haven’t been told that the password has changed. The signals just work fine, and at the end of the week I think it’s even money that it still won’t have changed when I likely will go back to that hotel.

– The next one didn’t even have a password.

– The next one used its fax number as its password. Apparently the owner just recently acquired the establishment and at least has gotten to the point of pulling the plug on the router for a few minutes whenever he notices a suspicious character in his parking lot. There were anywhere from two to four other insecure networks in range, although one called itself “free public wireless”, and the other was a nearby internet café.

– The next one has two routers without a password, and there’s another insecure signal in range.

At each place I have implored the people at the front desk to please install a password and change it at least monthly if not weekly, or even have an unique key generated for each guest or at least each hour for whoever comes in during that period (OK, this is a bit too much Big Brother, but the day may come), and not use a dictionary word; of course two of the five are staffed by employees without any real influence over such matters, and at another I suspect much the same.

In general I wonder how hard it is to have a control panel to their router to change the password, that they remind themselves to do according to a schedule they can mark on their calendar, or they can ask their IT guy to set up a script to do it automatically according to whatever schedule the innkeeper chooses, and they just need a quick reference note to show up on their guest registration screen with the “internet password”. I know, I can’t do it, but I could even figure out how to do a cron job; surely in the MS world it’s easier than that.

I congratulated the first place for their excellent password but said that after a while all someone has to do is stay a night or speak with someone who has and they can get the password. Then they could easily set up a router in the bushes nearby and a few repeaters or a wire to their house a few doors down and bingo, who cares about the cops banging down the innkeeper’s door. The cops *know* that hotel guests will often use their trips to hotels to download things they might never do at home. However, the innkeeper is paying for some thief to reduce the service he’s supplying to his customers just to remain competitive. All he needs is the bad publicity from the cops knocking down his door or those of his clients because of someone in a van with a laptop, who can drive away when the sirens are heard down the street, is conducting some illicit business using a hijacked connection.

I can put up with the nuisance of a fist-time password challenge web page at a hotel. I understand that Friday evenings to Sunday mornings — and possibly other times during the week — there are a lot of guests at a hotel and the speed is likely to be slower as a result. But I wonder about how much slower it is because some industrious person may be hidden somewhere in the bushes or the parking lot, or have a series of repeaters running down the block and slowing down the access I’m paying for through my room rate. Or temporarily losing a connection because the innkeeper is “scaring off” a suspicious character in the parking lot by unplugging his router for a few minutes.

And the notion that my door conceivably *could* be knocked down for someone in the parking lot, or at least, I could be a spectator to such a thing and still be questioned, is less than savoury.

My complaints *are* rather petty compared to world hunger. But that’s not the point: It seems to me to be a good combination of due diligence and, well, good business sense, just to change the passwords on the first of the month, or every Monday. They put key-card locks to the pool, the whirlpool, the exercise room, and even the laundry room (that is coin-operated!) to limit access to their guests.

Why not do the same for their wireless internet?