For example, John's modification where a login name is used in place of the email address could be codified into a KnowledgeBase article as a "supported hack" that, if we know it's in the problematic app, we can handle without a problem.
We could have many such "supported hacks" that would be no problem. Sorry, I should have mentioned this. :) Respectfully, Adam Phillip Churvis Member of Team Macromedia http://www.ProductivityEnhancement.com Download Plum and other cool development tools, and get advanced intensive Master-level training: * C# & ASP.NET for ColdFusion Developers * ColdFusion MX Master Class * Advanced Development with CFMX and SQL Server 2000 ********************************************************************** You can subscribe to and unsubscribe from lists, and you can change your subscriptions between normal and digest modes here: http://www.productivityenhancement.com/support/DiscussionListsForm.cfm **********************************************************************
