Tom Allison wrote:

[...]

What about the tokens and the signature from the first instance?

What are the chances that I could do this without doing data integrity damage or suffering other inconsistencies in performance?

If it had been such a good idea, don't you reckon that Jonathan (who after all wrote dspam in the first place) would have "stumbled" on it long ago?

--Tonni

--
Tony Earnshaw
Email: tonni at hetnet.nl

Reply via email to