Log In
Sign Up and Get Started Blogging!
JoeUser is completely free to use! By Signing Up on JoeUser, you can create your own blog and participate on the blogs of others!
zubaz
Connecting 802.11b Palm TX to a 802.11g access point
How best to do it?
Published on February 21, 2006 By
ZubaZ
In
Personal Computing
I have a friend that is picking up the Wi-Fi signal from a neighbor from her 802.11g laptop.
There is no security on the neighbor's signal.
Her husband just bought her a Palm TX which has 802.11b and she wants to but can't connect.
Could she pick up a 802.11g (that also supports
access point and connect from there.
I have advised her that they could (and should) turn on some kind of encryption and the party is over. I have further advised her that the legality of what she is doing is questionable; that if I were her and had a good relationship with the neighbor I would ask to piggy-back. I also told her that a good neighbor might tell them that they need some security.
We'll see how THAT part plays out.
Popular Articles in this Category
Popular Articles from ZubaZ
Master Skinner Xiandi
Comments
1
Kevin_C
on Feb 22, 2006
If she is looking to piggy back on her neighbors connection she's out of luck when it comes to the TX. If the neighbors router only supports G then she will not be able to connect with her TX that only supports B. If she is looking to buy her own wireless router and get a highspeed connection then there are routers out there that support B and G or ever A, B and G.
I agree with you there Zubaz, if I had a neighbor that I knew who had an open access point I would definitely let them know.Here's hoping your friend decides to do what's right.
2
Double Zero
on Feb 22, 2006
I agree with you there Zubaz, if I had a neighbor that I knew who had an open access point I would definitely let them know.Here's hoping your friend decides to do what's right.
Question: If you help her accomplish what it is that no one seems to agree with, wouldnt that be almost as bad as doing the same?
I would say just let her fend for herself, *Or inform the person yourself whos access is being used they need to encrypt the signal..
3
ZubaZ
on Feb 22, 2006
It's a thin line I tread. Esy enough to say . . "Buy a G/B router and use the default settings."
But it's not something I would do myself.
-=sigh=-
Welcome Guest! Please take the time to register with us.
There are many great features available to you once you register, including:
Richer content, access to many features that are disabled for guests like commenting on the forums.
Access to a great community, with a massive database of many, many areas of interest.
Access to contests & subscription offers like exclusive emails.
It's simple, and FREE!
Sign Up Now!
Meta
Views
» 13489
Comments
»
3
Category
»
Personal Computing
Comment
Recent Article Comments
Let's start a New Jammin Thr...
LightStar Design Windowblind...
Adventures With MacOS
Modding Ara: History Untold
DeskScapes 11: The Dream Mak...
Which A.I. Software Are You ...
ChatGPT 4o vs. o1 vs. o1 Pro...
What's the Last Book You Rea...
A day in the Life of Odditie...
Let's see your political mem...
Sponsored Links