A technique for enabling a secure, point-to-point wireless connection
between a secondary computer (e.g., a personal digital assistant, etc.)
and a primary computer (e.g., a notebook, a desktop, etc.) is disclosed.
The primary computer is associated with an extended infrastructure
through an access point. The present invention enables the secondary
computer to communicate either with the associated primary computer or
with an extended network indirectly through the access point.