Is that Public Network really Safe?

PeterWallace

I just got back from being away for a few days and noticed something alarming! I got to the hotel that had open wireless internet access and connected my netbook to the network. Almost immediately my firewall software started to kick off alerts! There were all kinds of port scans to my netbook. Port scans are used by hackers to see what ports may be open on your pc. Once they know of open ports then the start to attack you from there. My virus/firewall program (eEye Blink Professional edition www.eeye.com) did what it was meant to do and stopped it from reaching. Being a Network Engineer I started to look at some of the information in the logs. I noticed the same ip address was hitting the firewall and kept hitting it. Doing a bit more digging I found the name of the computer and had a hunch what I was looking at. At that point I disconnected from the network.

Well it was then time to go try out the Hotels 2 shared business computers. I walked into the room that they were in and noticed both were Windows Xp Professional Boxes. Went to shut down to see what user was logged in and saw administrator! Yes shared computers that had administrator rights. The second item I looked into was what they were named and Ip address of them. Strange one of them just happened to have the same ip and address that kept attacking my PC. Next I looked for Antivirus software and found none (kind of figured that) and looked at the patch level and found service pack 1. (Note should have been service pack 3). I knew what I was going to find. I tried to go out to several online virus scanning services to scan the pc and was blocked. Tried to go to several sites to down load Antivirus and was blocked by that. Tried to download spyware detection software and same thing. Got my Jump drive out that I carry the current free version of AVG antivirus with current virus definitions (free.avg.com) and installed it to the pc. Did a scan to find over 60 Virus. Cleaned them up and rebooted the pc. Next I installed Malwarebytes and current signatures (www.malwarebytes.org/mbam.php) and started the scan to find over 400 hits from that program. Cleaned everything up and rebooted the pc. Now the system was at clean but still missing many patches. Connected my netbook to the network and did not get all the firewall hits so at least that is now clean.

I went to go find the Manager to talk with him but only got the Assistant Manager to let him know what I found. I found out they allowed the Administrator access on both machines as too many people complained they could not download or run programs they wanted to but did not realize they were putting themselves and everyone that used the pc’s and networks in danger. Had I more time I would have cleaned the other machine and patched them both but the hotel was getting their IT people in to repair and secure the PC’s. Maybe next time I’m out that way I’ll swing in and check to see if they really are secure. If not, time for me to get out my Business Card and see if I can get some billable business out of the deal.

The Hotel name and location will stay with me as not to destroy and reputations.

January 20, 2026
Modern construction and manufacturing sites are no longer just about heavy machinery; they’re digital ecosystems. Tablets, laptops, IoT sensors, and mobile apps are now essential for everything from blueprint access to production monitoring. These tools enable real-time collaboration, safety compliance, and operational efficiency. But when your workforce is spread across remote job sites or large facilities, keeping these systems connected and secure becomes a challenge. Construction Blueprint & Plan Access: Crews use tablets to view updated plans on-site, reducing errors and rework. Safety & Compliance Reporting: Mobile apps allow instant incident reporting and safety checks. Equipment Tracking: IoT sensors monitor heavy machinery usage and maintenance needs. Manufacturing Production Line Monitoring: Tablets and IoT devices track throughput and detect anomalies. Quality Control: Mobile devices capture and share inspection data in real time. Inventory Management: Connected devices streamline material tracking and reduce downtime. These tools keep projects moving, but only if they’re secure, updated, and accessible anywhere. Why Remote Access Is Critical Construction sites and manufacturing plants often operate in remote or rugged environments. Workers need secure, reliable access to company systems, whether they’re in the field, on the shop floor, or traveling between sites. Without proper management, connectivity issues and security gaps can lead to delays, data breaches, and compliance failures. How a Managed IT Services Partner Helps You Win Partnering with a Managed IT Services provider lik e Eberly Systems ensures: Centralized Device Management: Configure, update, and secure all devices remotely using Microsoft Intune. Enterprise-Grade Security: Microsoft Defender protects against threats across IT and OT environments. Identity & Access Control: Microsoft Entra ID enables MFA and conditional access for subcontractors and BYOD scenarios. 24/7 Monitoring & Support: Proactive threat detection and performance monitoring keep operations running smoothly. Scalable Solutions: Whether you have 50 devices or 500, policies and updates roll out automatically. This means your teams can access critical tools and data securely anytime, anywhere, without worrying about downtime or cyber risks. Construction and manufacturing thrive on precision and speed. Technology makes that possible, but only when it’s managed effectively. A trusted Managed IT Services partner doesn’t just keep devices secure, it keeps your business moving, your workforce connected, and your data protected. Ready to empower your teams and safeguard your operations? Contact Eberly Systems today for a free consultation.
By Guest Blogger December 9, 2025
Why Device Management Is Critical
November 4, 2025
Why Cybersecurity Hygiene Matters for SMBs
October 28, 2025
Why Leading with AI Matters for Small and Medium-Sized Businesses
October 10, 2025
Fake CAPTCHA Sites Hijack Clipboard to Install Malware
October 10, 2025
Understanding Business Email Compromise (BEC)
By Kordel Eberly August 17, 2025
Welcome to the Cyber Cold War
fish hook
By Eberly Systems September 20, 2024
We're all in the same boat trying to avoid cybercrime! Here's our top ways to identify a potential phishing attempt.
By Eberly Systems September 10, 2024
Focus on integrating with new team members and new customers