Are peer-to-peer networks for criminals? Is network security too tough on the end user? Wireless Hot Spots; are you Warchalking?