I think what I'll do is just log $ENV{'REMOTE_HOST'} and $ENV{'REMOTE_USER'} into a mysql database so I can review that info to watch for abusers.
Since they are logging in that will help verify most everybody and if a user wants to give out his login info to other folks then just watching my little log should help identify that, investigate it a bit, and then cancel their account if they are actually being stupid. Anywho thanks for your time and inpout Bob, I apprciate it! Dan -- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]