That's why the borrowed password thing is so interesting
- same guy coincidentally duped for his email account that is later beheaded by the same group 10,000 miles away? (he is either Gump, a lefty ANSWER agent, or guided by clowns in action)
-why did he go to either place, (ok or iraq)?
It seems from the earlier article that Berg's email account was 'passed around', and used as I described. (even though Pooh's method may be an improvement in security)
Eye-opening experiment: go to a store in a mall that demos the Palm Tungsten C or Tungsten T3 (these are the Wi-Fi Palm products). Click on the Wi-Fi access icon.
There's usually 3-6 networks, and a couple of these will be unsecured, ready to access.
A lot of folks just do not understand the need to secure their computers and network access, or how to do it.