In addition to the other good suggestions, modify you program to record a plain old text log of dangerous actions confirmed by users. These kinds of people usually shut up pretty quickly when you tell them the date, time, IP address of the machine, and login name of the user who did it. -- Scott Ribe scott_ribe@xxxxxxxxxxxxxxx http://www.killerbytes.com/ (303) 722-0567 voice