Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
United States Security

Howard Schmidt Resigns As Cybersecurity Advisor 133

scubacuda writes "CNN and others report that former Microsoft chief of security Howard Schmidt has resigned as White House cybersecurity adviser. 'With the historic creation of the Department of Homeland Security, the transfer of many of the responsibilities from the Critical Infrastructure Protection Board and the release of the strategy, I have decided to retire after approximately 31 years of public service and return to the private sector,' Schmidt said in his April 21 e-mail."
This discussion has been archived. No new comments can be posted.

Howard Schmidt Resigns As Cybersecurity Advisor

Comments Filter:
  • by Anonymous Coward on Monday April 21, 2003 @10:03PM (#5778351)
    I mean, I know we saw plenty of "What's good for Microsoft is good for America" rhetoric during the anti-trust trial, but that would be a bit over the top.
    • Cumulative (Score:3, Informative)

      by Anonymous Coward
      "Howard has over 31 years public service having served with the US Air Force in various roles from 1967-1983 both active duty and in the civil service. He has served in the military reserves since 1989 and currently serves as a Credentialed Special Agent, US Army Reserves, Criminal Investigation Division (CID). He has testified as an expert witness in federal and military courts in the areas of computer crime, computer forensics and Internet activity."
      • by benna ( 614220 )
        OK, that was a bit too informative. Are you him or something?
        • by Anonymous Coward on Monday April 21, 2003 @10:20PM (#5778440)
          No, I read the articles linked in the Slashdot story.
          • by kuroth ( 11147 ) on Monday April 21, 2003 @10:27PM (#5778464)
            >No, I read the articles linked in the Slashdot story.

            Look buddy, if you're going to be pulling shit like that, I'm afraid you're just going to have to leave.
        • by 4of12 ( 97621 )

          OK, that was a bit too informative. Are you him or something?

          Yes, I am that person.

          I'm willing to back up what I say with cash, too!

          During my tenure as a special United States government official, my business connections have netted me slightly more than US$47 million in funds in an account that has been kept safe from the contant roving prying eyes of liberal-biased media in America.

          Now, I need to transfer the money to a special account in the Cayman Islands, but need an unrelated person that will no

      • so if I serve 40 days a year in the military, after 10 years I would have 10 years of public service?
  • What? (Score:5, Insightful)

    by SixDimensionalArray ( 604334 ) on Monday April 21, 2003 @10:03PM (#5778355)
    I might be way off here, but didn't he just recently ACCEPT this position and he's already resigning?
    • Re:What? (Score:5, Funny)

      by PD ( 9577 ) <slashdotlinux@pdrap.org> on Monday April 21, 2003 @10:08PM (#5778380) Homepage Journal
      You're probably thinking of the privacy officer that came from DoubleClick. Another obvious choice. The Department of Oxymoronic Mandarins must be well funded this year.
    • Re:What? (Score:5, Insightful)

      by Blaine Hilton ( 626259 ) on Monday April 21, 2003 @10:52PM (#5778585) Homepage
      This is probably a sign that the current administration has really bad cyber security plans. I know they really are not doing too much for homeland security too. They have all these billions of dollars, but it doesn't seem that it's going for any real protective measures.

      Go calculate [webcalc.net] something

      • As opposed to an administration that did have a good cybersecurity plan? lol.

        The problem is definitely not money, as you pointed out, but a lack of the right leadership and knowledge to get something done right! (and maybe a little red tape, miscommunication and people stuck in their own ways)
      • Oh my! I think we found the one /.er who actually thinks this administration has a plan for anything.
      • Re:What? (Score:2, Funny)

        by Guppy06 ( 410832 )
        "This is probably a sign that the current administration has really bad cyber security plans."

        If the security is so bad for a former Microsoft employee to want to wash his hands of it, I weep for the future.
        • "This is probably a sign that the current administration has really bad cyber security plans."

          If the security is so bad for a former Microsoft employee to want to wash his hands of it, I weep for the future.

          More likely he didn't like being ripped apart by real security. If their plan was like Britain's "e-government", which consisted of Blair starring in the Office XP launch then switching all government sites over to IIS, I'm sure this MS guy would be delighted. If he objects to it, that's a good sign

    • Re:What? (Score:5, Insightful)

      by Motherfucking Shit ( 636021 ) on Tuesday April 22, 2003 @12:26AM (#5778938) Journal
      I might be way off here, but didn't he just recently ACCEPT this position and he's already resigning?
      Yep. His predecessor resigned, too, just three months ago, citing the Slammer worm as his reason for leaving. It seemed like a bad excuse at the time, and it seems even worse now, after two people have resigned that position this year.

      My hunch is that either:

      a) Whoever's in the office of Cybersecurity Adviser is basically the designated fall guy. We'll see this person pushed out (e.g. fake resignation) whenever there's a "cyber attack" that he "should have seen coming."

      b) Both men accepted this position, realized that the plans they're supposed to implement are just feel-good actions which aren't going to really accomplish anything security wise, and decided to get out.

      c) Both men accepted this position, were asked to do something they couldn't morally/personally agree to do (perhaps some sort of TIA-style project, or overzealous "figure out how to route the entire internet through the NSA" plan) and decided to get out.

      d) The government doesn't pay me enough to put up with all this shit.

      e) Some combination of the above.

      Granted, all of these are speculation, but I imagine the true answer is probably e). It'll be interesting to see how long the next one lasts.
      • Re:What? (Score:2, Funny)

        by ch-chuck ( 9622 )
        a) Whoever's in the office of Cybersecurity Adviser is basically the designated fall guy. We'll see this person pushed out (e.g. fake resignation) whenever there's a "cyber attack" that he "should have seen coming."

        That's like the old story about the king who always kept several heads of cabbage on his advisory committee. That way, whenever one of his programs conspicuously miscarriages, he could announce that a member of the royal staff has just been beheaded over it, to everyone's nodding approval.
      • Re:What? (Score:1, Funny)

        by Anonymous Coward
        c) Both men accepted this position, were asked to do something they couldn't morally/personally agree to do (perhaps some sort of TIA-style project, or overzealous "figure out how to route the entire internet through the NSA" plan) and decided to get out.

        Schmidt accepted jobs from Microsoft AND the government, and you think he has morals!?!?!
    • Yes, and he found out that the US Government is treating the world the same way Microsoft does. What's left to do? ;-)
  • Imagine... (Score:5, Funny)

    by Anonymous Coward on Monday April 21, 2003 @10:06PM (#5778368)
    ...a Beowulf cluster of these resignations!
  • Wow! (Score:5, Interesting)

    by stevens ( 84346 ) on Monday April 21, 2003 @10:07PM (#5778374) Homepage

    2 whole months!

    I wonder what really made him quit?

    • Re:Wow! (Score:5, Funny)

      by zulux ( 112259 ) on Monday April 21, 2003 @10:16PM (#5778423) Homepage Journal
      2 whole months!

      I wonder what really made him quit?


      Buffer overflow - he actually got six years of work done in those two months.

      Too bad most of it was jibberish.

    • Re:Wow! (Score:3, Interesting)

      by rmarll ( 161697 )
      Just a guess, but given his history I'd wager he was ignored or rendered inefectual by the exectutive branch. At this point in his life he probably wanted to do something that really mattered and got told to go play solitare and draw his salary while his duties were delegated away. Mabie to someone who was more interested in upgrading Carnivore than developing meaningful security.
    • Re:Wow! (Score:5, Funny)

      by Chester K ( 145560 ) on Monday April 21, 2003 @11:07PM (#5778639) Homepage
      I wonder what really made him quit?

      He finished his job. The Internet is now secure. Thanks, Howard Schmidt!
    • Re:Wow! (Score:4, Funny)

      by Karl_Hungus ( 180893 ) on Monday April 21, 2003 @11:41PM (#5778785)
      2 whole months!

      I wonder what really made him quit?



      Maybe they forgot to reboot him?
    • Re:Wow! (Score:3, Insightful)

      by Ben Hutchings ( 4651 )
      His role is effectively being replaced by a role in the Department of Homeland Security, and he failed to get that job. He didn't feel like sticking around being irrelevant. Well, that's my guess.
    • He found out about administration plans to let a massive cyberattack happen without intervention. Dozens of the most powerful people on the planet are in on it, including his old boss, Bill Gates. They are set to cash in through insider trading, and the direct destruction of their biggest competitors.

      He couldn't stand to have it happen on his watch, so he's quitting. (He is heroic in this theory, because it makes a better screenplay that way.) He secretly assembles a crack team of open-source developers
  • Good Job! (Score:4, Funny)

    by barista ( 587936 ) on Monday April 21, 2003 @10:11PM (#5778396) Homepage
    Good Job. We all know how secure Microsft products are.

    I nominate Hillary Rosen to be the next Cybersecurity advisor

    /troll
    /sarcasm
  • by Anonymous Coward
    "I have decided to retire after approximately 31 years of public service "

    HUh?? Okay he just came from Microsoft...where does the 31 years of Public service come from? I assume before he was at M$...He realy served the public by going to work for M$.

    Or does serving at Microsoft means Public service? Ahh..public open and hackable servers...i guess that would be public service, or at least offering services(and data) for free to the public.

    Besides that though, M$ has not been open for 31 years.
    • Read his bio (Score:3, Informative)

      by djupedal ( 584558 )
      This guy reportedly held every gun toting postion out there, short of bounty hunter for Santa Clara County. SWAT teams...CID...FBI, etc. MS appears to have been the least of it. I imagine he will spend his time cleaning his guns, now that he's retired.
  • by jbwiv ( 266761 ) on Monday April 21, 2003 @10:12PM (#5778402)
    I can just imagine the look on their faces...

    "Wait a minute...this guy was the Chief of Security for who?!?"
  • by shawnywany ( 664241 ) on Monday April 21, 2003 @10:13PM (#5778405)
    the security advisor resigns via e-mail? doesn't anyone find this a little bit ironic? :)
    • No. The irony is that I'm sure somone snooped said cybersecurity's message that was tripping along his department's network...

      ...and THAT is why we heard about it...really. ;)

    • Maybe the email was really from the BOFH [ntk.net].
  • hmm (Score:3, Funny)

    by B3ryllium ( 571199 ) on Monday April 21, 2003 @10:14PM (#5778409) Homepage
    I smell a sequel ...

    About Schmidt 2: Cyber Patrol
  • humphh (Score:2, Informative)

    by djupedal ( 584558 )
    WASHINGTON (AP) -- White House cybersecurity adviser Howard Schmidt announced his resignation Monday, the second person to leave the post in three months.

    Schmidt was the former chief of security at Microsoft Corp. before taking the post in February. He succeeded Richard Clarke, who had spent 11 years in the White House across three administrations, and was the president's counterterror coordinator at the time of the September 11, 2001, attacks.

    The White House confirmed Monday that Schmidt would leave at t
  • by Anonymous Coward on Monday April 21, 2003 @10:20PM (#5778438)
    WTF? He's only been there for like 2 months. Why was he fired? This is truly disapointing for the welfare of our government's computer systems. Who else could possibly be more qualified than the former Chief Security Officer for Microsoft Corporation?
  • by DASHSL0T ( 634167 ) on Monday April 21, 2003 @10:22PM (#5778450) Homepage
    After repeatedly informing coworkers about how much I Love You.vbs and numerous emails about his daughter Melissa.vbs, Mr. Schmidt was on thin ice.

    Apparently his suggestion to replace Dr. Pepper with Code Red in all the vending machines was the final straw.

  • by D3TH ( 15279 ) on Monday April 21, 2003 @10:29PM (#5778476) Homepage
    Having worked with Howard during his time with the Air Force, and having followed his career in the private sector and post-Air Force public service, this is really too bad.

    For those who don't know (which I assume is most of you), Howard was a pioneer in the area of computer evidence analysis, first as a 'local' police officer, and then as a federal Special Agent. It's important to note that his time at Microsoft had nothing to do with their products (this in response to all those "we all know how secure Microsoft products are" trolls out there).

    He and his wife are avid computer users, and Howard was one of the few people I've ever encountered at his level in Government service that could talk to you about technology and computers with any degree of real understanding. He built his own machines (at least when I was working with him) and was taught classes on low-level file system internals and disk layouts.

    He became involved with computer crime at a time when only hard-core hackers (not crackers) were really playing around with computers, and paved the way for many others who are themselves pioneers in the information security community, both in the public and private sectors. The atmosphere created and fostered during his time at the Air Force allowed many people to grow and learn, and many of them are not only members of the InfoSec community, but the open-source community as well.

    I'd better quit before this turns into blatant fanboyism, if it hasn't already. My intent is not to deify him, I just want all of you who've only heard him give nicely formatted press conferences or canned interviews to know that there's more to him than that. I'm not sure if you could really find someone better to be involved with the goings-on at that level, but I'm absolutely certain that you can find many many worse.

    • Well if as you say that he didnt have anythign to do with MS products, then as head of security one would think that MS should have tapped his knowledge of hackers. Perhaps some non-technological persepctive on the issues of security would have been useful.
    • by Anonymous Coward
      If he's so great then what was he on about with all those interviews where he insisted that Microsoft was completely focused on security? It was only a couple of years later when everyone at Microsoft resigned the fact that they didn't have a clue about security and took time off to try to figure it out.

      Canned interviews are quite telling because it puts a face on the hype. He was either saying things he didn't understand or he was knowingly selling a myth.
    • He may well have done all that. However, his two last major jobs were:

      * Microsoft chief of security -- Microsoft placed very, very little emphasis on security for years. It came back and bit them on the ass -- hard -- with IIS worms and a few high profile exploits. This became one of the most severe threats to their market share. So, you could say that maybe he was recommending improvements and being ignored, but the point remains that his sole responsibility in his job was to ensure that Microsoft dea
      • Since it's obvious from your reply that you didn't bother to read my entire post, I'm going to guess you're a troll. But since you're getting modded up, I figured I'd better point out why you're wrong. From my original post, to which you replied:

        "It's important to note that his time at Microsoft had nothing to do with their products"

        While Microsoft has it's share of problems with network and internal security, the problems that you CAN'T lay at his feet, if I understand his position there correctly, are
    • It's important to note that his time at Microsoft had nothing to do with their products (this in response to all those "we all know how secure Microsoft products are" trolls out there).

      Yeah, about that Windows update service, when it got compromised [theregister.co.uk] Mr. Schmidt did...? What exactly? Was that "product security" or "infrastructure security"? Or was the actual buffer overflow a product-level security issue, but the unpatched servers a corporate security issue? I wonder which one would have been easier t

      • by D3TH ( 15279 ) on Tuesday April 22, 2003 @07:29AM (#5780079) Homepage
        It's easy to sit on the sidelines and snipe, but the fact of the matter is you've done nothing to address my original post. Instead of nitpicking my statement about his position not being related to products, it would be nice if you had addressed my point, which is simply that during the time that I worked with him, he was significantly more clueful than the other administrators I've interacted with at his level.

        Since it's doubtful you were employed at Microsoft during his tenure there, and even less likely to have been privy to any policy or other decisions he made while there, its fairly disingenuous for you to now judge him on the content of a few news stories. I suppose that's always the problem with any position related to security, people never hear about the incidents that DIDN'T happen.

        Regardless, I'm not here to defend Howard's performance per se just to give my opinion, having worked directly with him (unlike you?) that there are certainly worse people they could tap for the job (see post below re: Hillary Rosen).
        • It's easy to sit on the sidelines and snipe, but the fact of the matter is you've done nothing to address my original post.

          Snipe? Please. I was pointing out facts. And I did address your point: I don't think his leaving the post is such a bad thing, because from where I sit (as a member of the general public/electorate, and not privy to the inner workings of Mr Schmidt's mind or his tenure at MS) I'm not at all sure what he did security-wise while at Microsoft. I don't know, as an outsider, what exac

          • I used the term "snipe" specifically because you're pointing out facts. The problem is your facts have little or nothing to do with the thrust of my original post. The best trolls are always the ones based in the truth.

            Listen, if you want to start your own thread attacking Howard for his lousy public performance during his tenure at Microsoft, or his willingness to attend press conferences and praise Microsoft's (fabricated?) single-minded focus on security I promise I'll have little or nothing to say in
    • Ok, I accept that he's a good guy. But that's what worries me - he starts a new job and ditches it within a couple of months. Why? What else could it be, other than the gov't has plans for its own citizens that he finds morally unacceptable?
    • It's possible I'll regret his resignation. He may have had some morals. It's quite difficult to tell. If he resigned because he was asked to do something that even he couldn't stomach, then I may regret his resignation.

      But I'm afraid I don't consider him a shining protector of individual rights. I haven't seen any evidence that indicates that I should. Still, there may well be worms he wouldn't swallow, and things he wouldn't do. I just don't have any evidence that would lead me to believe this.

      My s
  • by overshoot ( 39700 ) on Monday April 21, 2003 @10:43PM (#5778550)
    he announced, riding off into the West (well, to Redmond anyway).

    In other news, Microsoft announced that they had just been awarded a number of new Homeland Secuirity contracts.

    • A spokesman for the Department of Homeland Security was quoted as saying "See all this Stasi/KGB stuff was a joke, April Fools, I mean if we were serious about this would we be hiring Bill and the Monkey Man?"
  • 31 Years??? (Score:2, Insightful)

    by ackthpt ( 218170 )
    I have decided to retire after approximately 31 years of public service and return to the private sector,' Schmidt said in his April 21 e-mail."

    That reads like he's been working in the public sector all that time. But, I'm sure he hasn't divided his attention when working in the public sector ... unless it really turns out that Microsoft has been around longer than we all thought and the rise of Microsoft, Gates, et al, has been part of a massive plot!

    No... I wouldn't even consider that... well, proba

  • by toddhunter ( 659837 ) on Monday April 21, 2003 @11:00PM (#5778609)
    He didn't do the Austin Powers double quote thing with his fingers each time he said 'cyber'
  • by becktabs ( 628093 ) on Monday April 21, 2003 @11:34PM (#5778759)
    I really need some work.
  • by NZheretic ( 23872 ) on Monday April 21, 2003 @11:46PM (#5778801) Homepage Journal
    The endemic failure of Microsoft toward the security of it's own products, services and customers is reason enough to bring Howard Schmidt's leadership in the area of cyber-security into question.

    For example, Microsoft was notified of the issues, concerning only Microsoft implementation of its JVM, on September 2nd 2002 and after SEVEN MONTHS on April 9th 2003, Microsoft have issued an update to fix the problem.

    Such a delay with such a serious vulnerability is so abysmal that it borders on the absurd.

    Quality and security are measures which only mean something when compared relatively to another.

    There is no absolutely secure, therefore you must expect, that once a vulnerability is made known to the vendor, the vendor should do their utmost to close the Window of Exposure ( http://www.counterpane.com/window.html [counterpane.com] ) as soon as possible.

    For example, with the lastest SAMBA vulnerability, once notified, the SAMBA developer owned up to the mistake and the SAMBA project released a patch within 48 hours. Within aother 24hrs, redhat had already backported the patch into their distributions RPMs. Similarly any major security issues in Mozilla and Netscape browser are also fixed and updateable within a couple of days

    Meanwhile, there are currently 13 KNOWN unpatched vulnerabilities in Microsoft's Internet Explorer ( http://www.pivx.com/larholm/unpatched/ [pivx.com] ).
    Some DANGEROUSLY EXPLOITABLE have not been fixed in over a year ( http://security.greymagic.com/adv/gm002-ie/ [greymagic.com] ). That Microsoft has not rewritten the scripting system embedded with IE so that it is sandboxed by default is bad enough, but to have such major unpatched vulnerabilities exposed for months is abysmal.

    Other inherent vulnerabilities, such as the Shatter attack ( http://security.tombom.co.uk/moreshatter.html [tombom.co.uk] ), Microsoft has known about since 1994!

    Even if the API/call flaw is inherently unfixable, that is plenty of time for Microsoft to implement a safer methord/systemcall/API, adapt it's own applications to use the safer methord and depreciate the unsafe API.

    It also appears that Microsoft 's own implementation of SMB is vulnerable and Microsoft has known about it for over eight years ( http://developers.slashdot.org/comments.pl?sid=599 60&cid=5681769 [slashdot.org] ), but Microsoft either choose not to, or cannot fix the problem themselves.

    Microsoft is clearly not closing the vulnerabilities they are aware that exist in their products and services.

    A year after after Bill Gate's Email promoting securtiy over functionality, Microsoft by choice, remains neither secure or trustworthy.

    Microsoft's attitude towards the security of it's products, service and customers is abysmal.

    From Jason Coombs' A response to Bruce Schneier on MS patch management and Sapphire ( http://www.securityfocus.com/archive/1/315158 [securityfocus.com] )

    Microsoft Baseline Security Analyzer (MBSA) and Microsoft's version of HFNetChk both failed to detect the presence of the well-known vulnerability in SQL Server exploited by Sapphire, which is one of the reasons so many admins (both inside and outside MS) had failed to install the necessary hotfix. MBSA and HFNetChk are Microsoft's official patch status verification tools meant to be used by all owners of Windows server boxes ...

    ......In addition to designing MBSA to avoid scanning for SQL Server vulnerabilities, failing to update mssecure.xml reliably and in a timely manner, deprecating HFNetChk by pushing the MBSA GUI as its preferred replacement, and hiding the details of the technical limitations

  • Isn't it odd that despite spending billions on DEFENCE for decades, none of that investment supplied _any_ defence that mattered on the day.

    Should this new entity be renamed dept. of Real Defence or should the dept. of Defence be renamed Dept. of Offence? who deserves the name most?
    • Yeah, Department of Defense is a stupid name, a ridiculous euphemism. We originally had a Department of War, which had a more honest name, but in a previous big gov't reorganization sometime after WWII, we ended up with the DoD. Interesting that since the Department of War was subsumed into the DoD, our wars have only been waged without a declaration from Congress, which would seem to go against the Constitution. It seems that the gov't has been trying to remove any official mention of the word war when it

  • he obviously knows which strings to pull to get killer contract assignments.. this being said it may be the case that he simply got an offer in the private sector that he couldn't refuse.

  • by Anonymous Coward
    I wonder if there is any connection between his resignation and the decision by DARPA to pull funding from the openBSD project due to some remarks made by de Raadt?

  • by eidechse ( 472174 ) on Tuesday April 22, 2003 @12:36AM (#5778970)
    As evidenced by the fact that this: "We are concerned that the cybersecurity issue is losing visibility inside the White House," said Harris Miller, president of the Information Technology Association of America. "In this case, the 'bully pulpit' opportunity to influence the development of a truly secure cyber infrastructure and associated best practices will be lost." is one of the main opinions expressed in this article. We've elevated commerce to such a position that the perspective of a trade group is of primary importance when reporting on government and security. I know this isn't new. Business has played a large role in politics and civics (if the two can be separated) for at least the last 2000 years, but it seems especially egregious when Miller laments the loss of the "bully pulpit" as if he just got outpid for a Super Bowl commercial slot.
  • 'With the historic creation of the Department of Homeland Security, the transfer of many of the responsibilities from the Critical Infrastructure Protection Board and the release of the strategy, I have decided to retire after approximately 31 years of public service and return to the private sector,' Schmidt said in his April 21 e-mail."

    "Looks like I can't do much more damage around here!"
  • "The Melissa virus hit so many of us unprepared because we didn't expect people to do bad things like that,"

    See it cached here [216.239.33.100]

    Obviously the lights are on but no one home when this clown is in charge of security.

    "we didn't expect people to do bad things like that" .. errr DUHHHH.. God, is he asleep at the wheel or what?

  • From the initial post: "[Schmidt] decided to retire after approximately 31 years of public service and return to the private sector."

    Okay, so it appears that he counts his service as Microsoft's Chief of Security towards his public service career. That may sound a bit presumptuous of him, but I think I see a pattern here. There are now five branches to the US Government: Legislative, Executive, Judicial, the Press, and Microsoft. Or, will Microsoft's crack team of lawyers assume responsiblity for the Judic

  • by Anonymous Coward
    "It is not sufficient to just respond to attacks, but rather proactive measures must also be implemented to reduce vulnerabilities and prevent future attacks."
    Let's launch a preemptive cyberstrike against a small country, preferably in the middle east, which is not a threat to us, and which is unable to fight back! That will surely stop CYBERTERROR!
  • Really, I'd love to do it.
  • 1.) john poindexter
    2.) ollie north
    3.) barry mccaffrey
    4.) bob bennett

    the people's choice...kevin mitnick!

  • former Microsoft chief of security Howard Schmidt has resigned as White House cybersecurity adviser. 'With the historic creation of the Department of Homeland Security...'

    Within two months the guy has checked out that the Homeland is same secure as the rest of Microsoft products.

    So, should we just read security alerts about flaws, or we have to look for patches to apply? And are those patches really free?

    P.S. I have a feeling, while looking for the design of the system Mr. Schmidt has recently left,

Algebraic symbols are used when you do not know what you are talking about. -- Philippe Schnoebelen

Working...