On Sat, 5 Jul 1997, Amos Shapira wrote: > What about just using NIS? This is basically what it does - put the > databases in DBM files. as far as i know, NIS is inherently insecure, and shouldn't be used in un-trusted environments. furthermore, i didn't notice NIS using dbm files. but then again - who am i to tell- i never read the sources... guy