On Wednesday, April 9, 2003, at 10:51 AM, Mike Beede wrote: > Sounds like the major use would be hacking other people's > computers that are using it for peripherals. Interesting > report. Thanks. Yep. There you are in the cafe and decide to sync your phone via bluetooth. You open bluetooth and find 18 computers listed...what to do...what to do... A quick peek at each shows that only three of them have protected themselves and the other 15 have directories you can navigate... How long till some hacker begins planting viruses and trojans on other people's drives. --- jackrodgers at earthlink.net http://www.jackrodgers.com