In addition to the other good suggestions, modify you program to record a plain old text log of dangerous actions confirmed by users. These kinds of people usually shut up pretty quickly when you tell them the date, time, IP address of the machine, and login name of the user who did it.
-- Scott Ribe [EMAIL PROTECTED] http://www.killerbytes.com/ (303) 722-0567 voice ---------------------------(end of broadcast)--------------------------- TIP 3: Have you checked our extensive FAQ? http://www.postgresql.org/docs/faq