Peter, I concur with Ed. Put in another light, validation for eye-catcher's, flag bit's and the likes, have been around for decades and has thus far been a reliable and dependant way for decades. Perhaps more importantly, it's the only reliable avenue. Infact, if I may, I'd have to say that the practice is relatively the same even internally, to the big blue. Once more, in line w/Ed, if this philosophy changed .. I'd imagine lot's of software would break .. to include big blue's code !!. Kind Regards. Jim Thomas The contents of this e-mail are intended for the named addressee only. It contains information that may be confidential. Unless you are the named addressee or an authorized designee, you may not copy or use it, or disclose it to anyone else. If you received it in error please notify us immediately and then destroy it.
---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

