Brian, good points ! This wouldn't stop somebody from grabbing the key and using crypto-api themselves. I wonder how Richard Howarth manages this (potentially same problem there ?) ... is it feasible to run KiXcrypt and "steal" the decrypted script out of %temp% ?

Would a crypto-activex control be "easier" to crack than KiXcrypt ?

-Shawn