I think I may have a soloution for you, but, I am not sure how good it is. I remembered it from this site that I frequented when I had aspired to become a hacker, something that I decided to dump a while ago. but here it is, nevertheless:<br><br>borrowed from the Guides to Mostly Harmless Hacking (<A HREF="
TARGET="_new">
Now we get act like real hackers. We are going to put part of the Registry where we can see -- and change -- anything. For Netscape Navigator, go up to the Registry heading on the Regedit menu bar. Click HKEY_CURRENT_USER . This will give you a screen with a left hand side and a right hand side window.<br><br>5a) Click the "Software" topic. This will give you "Netscape" on the left hand side. On the right hand side you will see the URL history. Just delete them and you're home free.<br><br>4b) For Internet Explorer, first click the HKEY_CLASSES_ROOT line to highlight it. Then go up to the Registry heading on the Regedit menu bar. Click it, then choose "Export Registry File." Give it any name you want, but be sure it ends with ".reg".<br><br>5b) Open your exported version of HKEY_CLASSES_ROOT in Word Pad. It is important to use Word Pad instead of Note Pad or any other word processing program. One way to get it into Word Pad is to right click on your exported file from Explorer. Warning: in Explorer, if you left click on a file with the .reg extension, it will automatically import it back into the Registry. If you had been messing with it, you could trash your computer big time. Don't ask me how I found this out.<br><br>6) Read. Enjoy! Everything you ever wanted to know about Windows security that Microsoft was afraid to tell you is floating around here. We see things that look like:<br><br>[HKEY_CLASSES_ROOT\htmlctl.PasswordCtl\CurVer]<br><br>@="htmlctl.PasswordCtl.1"<br><br>[HKEY_CLASSES_ROOT\htmlctl.PasswordCtl.1]<br><br>@="PasswordCtl Object"<br><br>[HKEY_CLASSES_ROOT\htmlctl.PasswordCtl.1\CLSID]<br><br>@="{EE230860-5A5F-11CF-8B11-00AA00C00903}"<br>7) It isn't real obvious which password goes to what program. What the heck, delete them all! Of course this also means your stored passwords for logging on to your ISP, for example, may disappear.<br><br>8) (Optional) Want to erase your surfing records? For Internet Explorer you'll have to edit HKEY_CURRENT_USER, HKEY_LOCAL_MACHINE and HKEY_USERS. You can also delete the files c:\windows\cookies\mm2048.dat and c:\windows\cookies\mm256.dat. These also store URL data.<br><br>9) Import your .reg files back into the Registry. Either click on your .reg files in Explorer or else use the "Import" feature next to the "Export" you just used in Regedit. This only works if you remembered to name them with the .reg extension.<br><br>10) Oh, no, Internet Explorer makes this loud obnoxious noise the first time you run it and puts up a bright red "X" with the message "Content Advisor configuration information is missing. Someone may have tried to tamper with it."<br><br>To get rid of this warning , click on "View," then "Options" then "Security" then "Disable Ratings." It will ask you for a password, but just hit enter and the net babysitter feature is entirely shut down, tamper warnings and all.<br><br>Of course if your parents or boss are smart they will check Explorer from time to time to see that the ratings feature is still enabled. But you can fix that by renaming the backups of the two files that make up the registry: system.da0 and user.da0. Use the instructions above on how to make a hidden read-only system file into something you can write. Then rename them system.dat and user.dat. Reboot your system. Then all the passwords are back and the netbabysitter feature works again. This is really fool proof because the registry files are always being updated by Windows. So it won't look the least bit suspicious if they have a recent time stamp on them.<br><br>I hope this helps <p>theEclipse<br><a href=mailto:eclipse_web@hotmail.com>eclipse_web@hotmail.com</a><br><a href=robacarp.webjump.com>robacarp.webjump.com</a><br>**-Trying to build a documentation of a Javascript DOM, crossbrowser, of course. E-mail me if you know of any little known events and/or methods, etc.