Gregg, I am in agreement with Hugh. Given enough time and effort, you can pretty much crack any security implementation physical or technological. The reasonable thing to do is to make the task too difficult or too time consuming for the average troublemaker. With the example of WiFi, using stronger encryption and limiting the MAC address (network cards) that access the network are good and simple starts. There are many more layers that you could add, but realistically the average leech is going to go for the open spots. When it comes to technology, we live in a world of compromise. You have to balance securing something so tightly that it is unusable, versus making the system so open it is easily compromised. just my two cents, Derek Buchanan PCSOFT's List Owners: Bob Wright<[log in to unmask]> Mark Rode<[log in to unmask]>