This method of security through obscurity will not prevent another hacker from chaning the worm to use one of the modified versions of the exploit which supports brute forcing. Nor does it trick Solar Eclipse's scanner which actually overflows and checks to see if the server response contains our data. All you did was waste your time. :) peace, core -- Charles Stevenson (core) <core@bokeoa.com> Lab Assistant, College of Eastern Utah San Juan Campus http://www.bokeoa.com/~core/core.asc