John Miskinis writes: > So should I persue trying to get my system to authenticate my ISP's > connection to my machine?
No. They won't do it. > Or is this not typically used for systems that connect TO an ISP? Right. You called them, so you know who they are. > I'm hoping that it's OK to live without out it, and not open my system up > to possible intrusion. There is no risk. It's how things are normally done. -- John Hasler This posting is in the public domain. [EMAIL PROTECTED] Do with it what you will. Dancing Horse Hill Make money from it if you can; I don't mind. Elmwood, Wisconsin Do not send email advertisements to this address.