Posted by Louisa on November 03, 2006 at 08:04:56:
In Reply to: The MID instruction posted by Jim Guerber on November 01, 2006 at 13:57:22:
We use the MID command but if you change the results, I can just rerun the security setup on my customers' machines and setup the new passwords. It makes more sense to return the plug number rather than the obscure number we are currently obtaining. It does seem to be consistent for each comet level.