> Umm, so the hackers who can't quite get into > your system WILL be able to intercept your > firewall data sent out afterward?? Sounds > like a great way for hackers to fine-tune > their efforts and see what's working... Quite possibly:-) The general thought did occur to me. The broad choices, as in all such areas where one is under attack, is to either hide in the dark behind closed doors (or hopefully closed firewalls) and hope the baddies will go away, or join, albeit in ever so small a way, with those taking action against them (Hamlet had a soliloquy on this * :-) ). The risk seems little enough in this case and the potential gains (especially given the stream of would be invaders who seem to beat a path to my door) to justify joining the contributors. Russell ______________ * To be, or not to be: that is the question. Whether 'tis nobler in the mind to suffer The slings and arrows of outrageous fortune Or to take arms against a sea of troubles And by opposing end them. _______ Tube heat, or nog tube heat: data's congestion. ladder tricks snow blur Hindu mine dew sulpher Tes slinks endharrows have ow! Cages portion Orc tube rake harms hay canst a Z oeuf bubbles Ant ply cop posy kingdom Kenneth Koch from "One Thousand Avant-Garde Plays" -- http://www.piclist.com#nomail Going offline? Don't AutoReply us! email listserv@mitvma.mit.edu with SET PICList DIGEST in the body