A system and method of providing network access comprising a processor, a first network interface coupled to the processor, a second network interface coupled to the processor, a storage media accessible by the processor and a set of computer instructions stored on the storage media, executable by the processor, where the computer instructions can be executable to receive a network communication over the first network interface from a user using a user device and determine if the network communication is associated with an authenticated user. If the network communication is not associated with an authenticated user, is not destined for a server in a walled garden, and a pre-authentication interface is specified, the computer instructions can be executable to direct the user to the pre-authentication interface. The computer instructions can be further executable to direct the user to an authentication interface when the network communication is not associated with an authenticated user, is not destined for a server in the walled garden, and a pre-authentication interface is not specified.

 
Web www.patentalert.com

< Method and apparatus for detecting hidden rootkits

> Detecting and addressing network attacks

> Detecting method and architecture thereof for malicious codes

~ 00580