Hi all: Bette Richards has reminded me (in private e-mail) that I forgot to include the most important details in my previous post; namely, I didn't tell anyone how to get the patch to close the RPC vulnerability hole. I will correct that oversight now. First, for more technical detail about the RPC vulnerability, refer to the following Microsoft security bulletin ... http://www.microsoft.com/security/security_bulletins/ms03-026.asp Note, the patches provided by Microsoft correct the RPC flaw in the following versions of Microsoft Operating systems ... o Windows NT v4.0 o Windows 2000 o Windows XP (Pro and HOme) o Windows server 2003. You can go to the following Microsoft web page and download a tool to scan your home PC and determine whether or not it has the RPC vulnerability ... http://www.microsoft.com/downloads/details.aspx? FamilyID=c8f04c6c-b71b-4992-91f1-aaa785e709da&DisplayLang=en (note, you have to append the second line to the first to get the actual URL. If you do it properly, the middle part of the URL will read as follows ... details.aspx?FamilyID=c8fo4) The following Microsoft web page has links to the patches to fix the RPC vulnerability. Read the info. on the web page carefully, as there are different patches for Windows server 2003 (32-bit) and Windows server 2003 (32-bit). The same is true for Windows XP. http://support.microsoft.com/default.aspx?scid=kb;en-us;823980#WinNT One more word of caution for everybody. Microsoft Corporation *N*E*V*E*R* distributes any fixes to its products via e-mail. If you get an e-mail message that appears to have been sent from Microsoft asking you to install the patch contained in an e-mail attachment, it is most certainly a HOAX! Best regards H.A. Kippenhan, Jr. _________________________________________________________________ MSN 8: Get 6 months for $9.95/month http://join.msn.com/?page=dept/dialup