Sure would be easier under Unix where you could just recreate users and copy the encrypted passwords over.
_________________________
Bitt Faulk