On Fri, 21 Mar 2014, Leon Fauster wrote: > its just used in a multiple layer protection / security model. Bingo! Same here. And it works well! > well i would say its more scary when humans are editing configuration files :-) I can speak for nearly 20 years of experience on this, including blowing it myself and locking myself remotely out of my own system once. For what it is supposed to do...it does extremely well. Gilbert ******************************************************************************* Gilbert Sebenste ******** (My opinions only!) ****** *******************************************************************************