On Tue, 07 Mar 2006 09:13:03 -0500, KY1K wrote: >... > Also, the stand alone hardware log in device (such as a cuecat) does > offer protection from internet based hacking-there is no way for a > hacker to actuate the hardware via the internet, so I deem this as an > acceptable log in method. > > Is this correct?? Unfortunately the Cuecat is just a barcode scanner, which inputs the contents of a barcode as if it was typed - it's a "keyboard wedge" device, meaning it plugs in between the keyboard and the PC. In this application all it does is save the user having to type the password - a malicious key-logger would capture the password just the same either way, and could then use it remotely. In the absence of a key-logger, it's as safe as typing the password from a Post-it note stuck on the screen... Cheers, Howard Winter St.Albans, England -- http://www.piclist.com PIC/SX FAQ & list archive View/change your membership options at http://mailman.mit.edu/mailman/listinfo/piclist