I have some phone home stuff on my machine but honestly how does it work if a a Thief cannot access the machine and therefore has to reformat the drive anyway? ---------------------------------------------------------------- This message was sent using IMP, the Internet Messaging Program.