Good point Charles. But there are ways to mitigate that exposure.
- check SYSCOLUMNS for the name of the 'field' in that particular 'file'
That kills two of the three points of attack.


Rob Berendt




Return to Archive home page | Return to MIDRANGE.COM home page