Tom Allison wrote: [...]
What about the tokens and the signature from the first instance?
What are the chances that I could do this without doing data integrity damage or suffering other inconsistencies in performance?
If it had been such a good idea, don't you reckon that Jonathan (who after all wrote dspam in the first place) would have "stumbled" on it long ago?
--Tonni -- Tony Earnshaw Email: tonni at hetnet.nl
