opencsv has the concept of a mapping strategy. This is what translates a column from an input file into a field in a bean or vice versa. As we have already implied in the documentation of the annotations, there are two basic mapping strategies: Mapping by header name and mapping by column position. These are incarnated in HeaderColumnNameMappingStrategy and ColumnPositionMappingStrategy respectively. There is one more addendum to the header name mapping strategy: If you need to translate names from the input file to field names and you are not using annotations, you will need to use HeaderColumnNameTranslateMappingStrategy .
Just remember: Whether you discovered a leecher or not, you should still use WPA2-AES encryption, and tackle other wireless router setup essentials . If, for some reason, you want to run an open wireless network or have to use WEP because some devices (., the Nintendo DS) won’t work over WPA, your best bet is to add a new, separate and secured wireless network for important stuff and only open the unsecured one for guests and WEP-only devices when needed (you can also get a router that broadcasts a separate wireless signal for guests only).