If i understand the basic idea behind peak.security it can be used for things other than web interactions correct? Would anyone be willing to give a basic (simpler the better) overview of how one can use it? Cheers, darryl (i resent this because my threaded mail reader put this way back in a thread from months ago for some reason..)