If i understand the basic idea behind peak.security it can be used for things other than web interactions correct? Would anyone be willing to give a basic (simpler the better) overview of how one can use it? Cheers, darryl