Jacques A. Vidrine wrote: > [...] > In that fashion, users have a choice of security policy. Could you elaborate a bit what you mean with `choice of security policy'? Which different security policies are there to choose from? -Oliver