Looks like I forgot to ask a question after my statements. :) What are others doing to secure their physical hosts in hostile environments? Eric