Well OK - what "security problems" occur if you use CSH - remember Berkley is CSH first SH second. Actually why doesn't one of the true guru's define all the "security problems" that you can get into with setuid programs in general. I am always willing to learn something. -- Peter Wolfe Microtel Pacific Research ..decvax!microsoft!ubc-vision!mprvaxa!wolfe