Hi hrfanmike, I appreciate your thanks, but the reality is that Tom and others have much more experience with AIM than I do. I just am the type of person who tries a variety of approaches to any method I come across. This is because of my background in information security analysis and attempting to see what might have been missed as a system was being set up.
One example was finding a very simple error in a UDP (User Datagram Protocol) device where, for 5 years they had not found the error, that they had used a C language program "long" instead of a "longlong" which was causing one of the client's machine to lock up every few months. How they missed it I have no clue and they did not believe me when I suggested that was the error because I am not a programmer, just an analyst who plays around with things.
The difference between a "long" and a "longlong" in the C language is that a "long" is a 32 bit size, ~4 gigabytes, (2 to the power of 31) whereas a "longlong" is 64 bit size, ~4 exabytes (2 to the power of 63).
Anyway, thanks again, and Best,
Allen