It's things like this that make me hate virtually ALL software that isn't made by Microsoft. Why anything would ever require network authentication when the user has already been authenticated, I'll never understand. And if software decides to have its own authentication methods and exist WITHOUT the option of just using AD authentication as an option, there better be a damn good reason to do that nowadays. Why does all software think it's important enough to require its own security system? Why does all software think it's important enough to automatically add something to the \run key and have a system tray icon? Why does all software think it's important enough to put itself in a user's quicklaunch? And more than anything, why does software providers think it's so damn important to make the interface all "neato" looking instead of worrying about making the damn application functional and not make people waste time figuring out an atypical interface? Ray at work -----Original Message----- From: Ewton, James B. [NCS VISUS] [mailto:JEWTON@xxxxxxxxxxxxx] I have this problem when users will use their network ID to run apps that require logins. When they change the password on the network ID, the app will present the old credentials, hence a bad attempt. Drives these snapperheads crazy. James -----Original Message----- From: Farrugia, Paul [mailto:pfarrugia@xxxxxxxxxxxx] Thanks for all the help.....it just happened again.....the user was logged onto the network, locked her pc and went to lunch....when she came back she unlocked her pc and was able to continue but when she opened outlook it asked for username, password and domain.....i checked her account and saw that she was once again locked out..... ********************************************************************************************************** The information contained in this e-mail message is intended only for the personal and confidential use of the recipient(s) named above. Distribution, publication, or retransmission of this message is strictly prohibited. This message may be a bank to client communication and as such is priviliged and confidential. If the reader of this message is not the intended recipient or an agent responsible for delivering it to the intended recipient, you are hereby notified that you have received this document in error and that any review, dissemination, distribution, or copying of this message is strictly prohibited. If you have received this communication in error, please notify us immediately by e-mail, and delete the original message. The sender of this e-mail specifically "opts-out" of the Electronic Signatures and Global and National Commerce Act (E-Sign) and any and all similar state and federal acts. Accordingly, but without limitation, any and all documents, contracts, and ageements must contain a handwritten signature of the sender to be legal, valid, and enforceable. ********************************************************************************************************** ******************************************************** This Week's Sponsor - RTO Software / TScale What's keeping you from getting more from your terminal servers? Did you know, in most cases, CPU Utilization IS NOT the single biggest constraint to scaling up?! Get this free white paper to understand the real constraints & how to overcome them. SAVE MONEY by scaling-up rather than buying more servers. http://www.rtosoft.com/Enter.asp?ID=148 ********************************************************** To Unsubscribe, set digest or vacation mode or view archives use the below link. http://thethin.net/win2000list.cfm