>I'd be very hesitant about giving away something that might enable >"destructive influences" to further their aims.
It's a damned if you do/don't. I thank IBM for closing a hole. But, without knowing anything about what the exposure is, how do we know how to configure the security settings? - Too busy driving to stop for gas! ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html