Reading an email on the big list... Now that is something I hadn't considered but should be headslap obvious. The operating system security features for user authentication and access privileges can actually be a control in a virtual reality fiction because it depends on roles. Kinda of a warped way to do it, but perfectly doable and exactly how we make access to information and modules configured in enterprise systems. Len http://www.mp3.com/LenBullard Ekam sat.h, Vipraah bahudhaa vadanti. Daamyata. Datta. Dayadhvam.h
- writing scripts Miriam English
- RE: writing scripts Bullard, Claude L \(Len\)
- RE: writing scripts Bullard, Claude L \(Len\)
- RE: writing scripts Miriam English
- Re: writing scripts Sandy Ressler
- Re: writing scripts Rev. Bob 'Bob' Crispen
- RE: writing scripts Bullard, Claude L \(Len\)
- RE: writing scripts Bullard, Claude L \(Len\)
- RE: writing scripts Bullard, Claude L \(Len\)
- RE: writing scripts Bullard, Claude L \(Len\)
- RE: writing scripts Bullard, Claude L \(Len\)
- RE: writing scripts Jed Hartman
- RE: writing scripts Bullard, Claude L \(Len\)
- RE: writing scripts Bullard, Claude L \(Len\)