I think what I'll do is just log $ENV{'REMOTE_HOST'} and $ENV{'REMOTE_USER'} 
into a mysql database so I can review that info to watch for abusers.

Since they are logging in that will help verify most everybody and if a 
user wants to give out his login info to other folks then just watching my little log 
should help identify that, investigate it a bit, and then cancel their account if they
are actually being stupid.

Anywho thanks for your time and inpout Bob, I  apprciate it!

Dan


--
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to