... An unauthorized attempt is already a security violation. ... But, an attempt that should not have succeeded could end up making headlines.
-teD (The secret to success is sincerity. If you can fake that, you've got it made!) ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html