Jeffrey C. Hunt scribbles: |> If someone else has a better understanding |>of the OIG process please butt in, NOW! There has to be other |>users on this list out there (or are they too busy changing their |>password). I should point out that it is not difficult to sniff passwords passing between any two machines on the net. Thus even if there is no log of host/user/password on oig it would not be difficult to collect victims. The only solution at the moment (short term until OIG mend their ways) is for persons to change their passwords and proceed to retrieve data with a screen capture method (eg 'script' on a Unix box). I could contrive some scheme for those who wish to retrieve the actual files on there (as oppose to browse the tle database). Neil.