I'm looking at the ENCRYPT function, and its definition is pretty vague. Does anyone use it? Does anyone know:
- what algorithm is used? - what size limitations are there on the key? - on a scale of 1 (my nephew could crack it in an afternoon) to 10 (a supercomputer would take a year), how secure is it? -Aaron * Email: [EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]> SunCom is the wireless company that's committed to doing things differently. Things we want you to know. This e-mail and any files transmitted with it are confidential and are intended solely for the use of the individual or entity to whom they are addressed. This communication may contain material protected by the attorney-client privilege. If you are not the intended recipient or the person responsible for delivering the e-mail to the intended recipient, be advised that you have received this e-mail in error and that any use, dissemination, forwarding, printing or copying of this e-mail is strictly prohibited. _______________________________________________________________________________ UNSUBSCRIBE or access ARSlist Archives at www.arslist.org ARSlist:"Where the Answers Are"

