Many networks are protected using a Novell BorderManager proxy, which forces you to login after a period of inactivity using a web form. This application allows users of the iPhone and iPod touch to store their username and password in the applicatio