On Thu, 2002-10-10 at 21:20, * wrote: > Thom; > > No, I did not. I have now, and it works. And you know, as I was > reviewing the RH 8 Customization Guide, the procedure was right there in > section 16.2.1. I will now crawl into the corner and hide. Thanks for > the info.
That was my mistake when I first started. Now I encrypt them and all is better. -- -=/>Thom Red Hat Linux release 8.0 (Psyche) running Linux Kernel 2.4.18-14 Uptime: 5:41pm up 6:13, 1 user, load average: 2.44, 2.43, 2.29 Registered Linux User #214499 http://counter.li.org