_H* sez: For months, I hear people piss and moan that they don't know where the holes are, and that they want full disclosure with detailed 'sploit methods to be accepted as the Correct Thing To Do. Then someone leaks a whole bunch of it, and people start thrashing and saying "what is this, what do I do with it?" ... Isn't this sort of thing what you *WANTED*? Isn't that one reason you're on this list?! ---------------------------------------------------- You don't understand... This is source code! What the heck am I supposed to do w/ it? You mean actually compile some of this stuff and fold it back into my system? Then it won't be supported by my vendor and I'll have to explain this to my boss... Not what I wanted. Gawd no. Get me off this list, its to scarry for me... I might have to think! -- --bill