Thanks for the suggestions!
Please note that those were not my suggestions. I was replying to stvn and quoting his suggestions whereas you are replying to me.
Just the same, now that I reread his first bullet, it is essentially the same as my inital suggestion minus an idle time check.
As I mentioned in my reply to pg in this thread, you really must rely on the authentication credentials you get. Your concern about booting someone off just because someone else got his login information is a bit misguided. That's exactly why someone has login credentials in the first place. If two people have the same login, there is no way for you to tell which one is authentic. Don't bother second guessing it.
-sauoq "My two cents aren't worth a dime.";
In reply to Re: Re: Re: Re: How should I handle Orphan Sessions?
by sauoq
in thread How should I handle Orphan Sessions?
by soon_j
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |