It's not for the faint of heart, but here's how geeks secure their communications channels: How-To: SSH tunnels for secure network access - Engadget
The big problem is "hotspots". If a hotspot doenn't have a password, then communications between computer and hotspot can be easily monitored. Passwords can be snatched enroute. VPN is one answer, SSH Tunnels are another.