One thing i would like to know is if we go with the built in scalar function encrypt/decrypt for the tables, does that need any kind of application level changes? is there any kind of limitation with this approach?
Regards Ron ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html