If you’re a frequent traveler you probably can’t do without Wi-Fi hotspots.
Though we have smart phones and blackberries, a good Wi-Fi connection lets us browse and communicate from the laptop.
However, wireless networking standards
and gear wasn’t specifically created with public applications in mind. Thus, as you may know too well, there are many annoyances that come along with using
Wi-Fi hotspots.
Here are five of the hotspot annoyances and tips on how to get around them:
#1 Securing the connection
Most hotspots don’t offer encrypted connections, so security should be one of your main concerns when using Wi-Fi hotspots.
Anyone within range of the signals can see the raw traffic of your connection. This isn’t a big deal if you’re just browsing the
Web. Connections to encrypted sites (such as banking and other sensitive
accounts) using SSL/HTTPS are completely secure.
However, traffic from other unsecured services, such as email, instant
messaging, and FTP, can be captured. A tutorial on
what Wi-Fi eavesdroppers see shows examples of these
vulnerabilities. Plus, some hotspots don’t block user-to-user communication, so
so any folders you are sharing may be compromised. These usually aren’t concerns when
you’re on private networks that use WPA or WPA2 encryption, and you trust the
other network users.
To solve this annoyance, you can use a Virtual Private Network (VPN)
connection to encrypt and scramble your traffic from local Wi-Fi eavesdroppers.
If your employer offers VPN access, you may be able to use it. Otherwise you can
use the free Web-based SSL VPN service from
AnchorFree,
or paid options from WiTopia or
HotSpotVPN. Then to prevent
others from connecting to your laptop, disable any shared folders and use
Windows Firewall. If using Windows Vista, specify the connection as public when prompted after connecting. This will automatically disable sharing and configure other settings as needed.
#2 Finding the free spots
Another annoyance you’ve probably had is trying to find a hotspot–or one
that’s free. If you’re a frequent traveler and/or hotspot user you might find
purchasing hotspot service, such as from Boingo
or T-Mobile, is feasible. However for
many casual users, finding and using the free spots will suffice. But you should
always be on the look out for incentive offers from phone and Internet
companies that offer free hotspot access.
If you know exactly where you’re heading before you leave, you can search for
hotspots on Wi-FiFreeSpot. It’s a good
idea to review the list of national or regional
companies that offer Wi-Fi.
That way even if you haven’t searched for spots in a specific area, you might be
able to find one of the stores that you know offers the service.
When traveling by car, keep in mind most hotels have Wi-Fi. So if you need a
connection you can probably pull off at any exit, park next to a hotel, and
access the hotspot if it doesn’t require a password or customer login.
#3 Accessing remote files
There probably has been times where you wished you could access your files or
computer when working remotely. For example, you forgot to take some documents
with you or you didn’t know you needed them when you left. However, if you take
some time to set up remote access, this situation doesn’t have to ruin your day.
If your work has a VPN set up, accessing your work files probably isn’t a
problem. However, if not, there are several options you can look into.
The VPN services mentioned in this article’s first section don’t include remote access capabilities. They are strictly intended to secure the wireless traffic
from hotspot eavesdroppers, thus the end-point or VPN server is offered by the
provider. To use a VPN for both encryption and remote access capabilities, you
need to set up your own, so the end-point is your network.
If the PC you want to remotely access is loaded with Windows XP Professional
or Windows Vista Business or Ultimate, you can actually create your own VPN for
free using Microsoft servers and clients. You may also consider buying a
router with that set-up that has a VPN server in it.
You can also find third-party
applications and services, such as the free GBridge
software.
Next Page: Getting past email blocks, sharing connections
#4 Getting past the email block
Some Wi-Fi hotspots block the traffic on port 25 for SMTP, which is used to
send email from clients like Microsoft Outlook. Additionally, some ISPs require
customers to send email from accounts they provide at only their Internet
connections. These two measures might help cut down on SPAM messages, but can be
a real headache when you go to check or send your email from public networks.
You should try to use Web-based email when away, so you won’t have to deal
with any of these issues; plus it can be secure. Your email provider may already
offer this in addition to the POP3/IMAP access. If not, you still have options.
If you are using email addresses provided by your own Web site, consider using a
utility like JMailbox to
host the service yourself. If the Internet or email provider doesn’t give you
Web access, try a SMTP relay or other service, such as
Mail2Web.
#5 Sharing a wired connection
At hotels you might find yourself using a wired connection instead of Wi-Fi.
If you’re traveling with others, you’ll probably all be fighting over the
connection in no time. However, you can wirelessly share a wired connection.
The person connected to the Internet via an Ethernet cable can create an
ad-hoc wireless network. Using the Internet connection sharing (ICS) feature
of Windows, he or she can share their Web access with others that connect to the
computer-to-computer network.
Another way around this issue is to bring along a wireless router. There are
small travel routers you can purchase; or you can buy a regular router, as most
are relatively small. However, if you have a router at home, and it isn’t needed
while you’re gone, you can just take that. It would also already be set up with
encryption (or it should be) and ready to go, just like at home.
ALSO SEE: What Wi-Fi Eavesdroppers See on Unsecured Networks
AND: Wi-Fi Advice: Wi-Fi Boosters, Hotel Wi-Fi
Eric Geier is an author of
many computing and networking books, including Home Networking
All-in-One Desk Reference For Dummies (Wiley 2008) and 100 Things You
Need to Know about Microsoft Windows Vista (Que 2007).
Ethics and Artificial Intelligence: Driving Greater Equality
FEATURE | By James Maguire,
December 16, 2020
AI vs. Machine Learning vs. Deep Learning
FEATURE | By Cynthia Harvey,
December 11, 2020
Huawei’s AI Update: Things Are Moving Faster Than We Think
FEATURE | By Rob Enderle,
December 04, 2020
Keeping Machine Learning Algorithms Honest in the ‘Ethics-First’ Era
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 18, 2020
Key Trends in Chatbots and RPA
FEATURE | By Guest Author,
November 10, 2020
FEATURE | By Samuel Greengard,
November 05, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 02, 2020
How Intel’s Work With Autonomous Cars Could Redefine General Purpose AI
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 29, 2020
Dell Technologies World: Weaving Together Human And Machine Interaction For AI And Robotics
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 23, 2020
The Super Moderator, or How IBM Project Debater Could Save Social Media
FEATURE | By Rob Enderle,
October 16, 2020
FEATURE | By Cynthia Harvey,
October 07, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
October 05, 2020
CIOs Discuss the Promise of AI and Data Science
FEATURE | By Guest Author,
September 25, 2020
Microsoft Is Building An AI Product That Could Predict The Future
FEATURE | By Rob Enderle,
September 25, 2020
Top 10 Machine Learning Companies 2021
FEATURE | By Cynthia Harvey,
September 22, 2020
NVIDIA and ARM: Massively Changing The AI Landscape
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
September 18, 2020
Continuous Intelligence: Expert Discussion [Video and Podcast]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 14, 2020
Artificial Intelligence: Governance and Ethics [Video]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 13, 2020
IBM Watson At The US Open: Showcasing The Power Of A Mature Enterprise-Class AI
FEATURE | By Rob Enderle,
September 11, 2020
Artificial Intelligence: Perception vs. Reality
FEATURE | By James Maguire,
September 09, 2020
Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.
Advertise with TechnologyAdvice on Datamation and our other data and technology-focused platforms.
Advertise with Us
Property of TechnologyAdvice.
© 2025 TechnologyAdvice. All Rights Reserved
Advertiser Disclosure: Some of the products that appear on this
site are from companies from which TechnologyAdvice receives
compensation. This compensation may impact how and where products
appear on this site including, for example, the order in which
they appear. TechnologyAdvice does not include all companies
or all types of products available in the marketplace.