Definitely worth the click ... Schneier on Security: The Life Cycle of Cryptographic Hash Functions http://www.schneier.com/blog/archives/2011/06/the_life_cycle.html -- Angus Scott-Fleming GeoApps, Tucson, Arizona 1-520-290-5038 Security Blog: http://geoapps.com/