Gregg,
   I am in agreement with Hugh.  Given enough time and effort, you can
pretty much crack any security implementation physical or technological.
The reasonable thing to do is to make the task too difficult or too time
consuming for the average troublemaker.  With the example of WiFi, using
stronger encryption and limiting the MAC address (network cards) that
access the network are good and simple starts.  There are many more layers
that you could add, but realistically the average leech is going to go for
the open spots.  When it comes to technology, we live in a world of
compromise.  You have to balance securing something so tightly that it is
unusable, versus making the system so open it is easily compromised.

just my two cents,
Derek Buchanan

                          PCSOFT's List Owners:
                      Bob Wright<[log in to unmask]>
                        Mark Rode<[log in to unmask]>