> The only way I can think of doing this is via client side encryption wher= e > anything leaving the client is encrypted first, so no plain data or keys = or > anything else that can be sniffed leaves the client without being encrypt= ed > locally first. Thats what I do. Something that I dont understand is how a program attempting to crack an encryption key would determine when it has found the key. It seems that it is common knowledge that given enough time the key can be cracked. For example if a password say "Wcbhj41d" was encrypted by xoring with "anxorkey" giving "65JO8_=8C=3D". How would the program determine "Wcbhj41d" was the solution if it ever found it. Justin --=20 http://www.piclist.com PIC/SX FAQ & list archive View/change your membership options at http://mailman.mit.edu/mailman/listinfo/piclist .