Its ok tupac, its obvious that the issue is above your pay grade, not a big deal. I just thought maybe you knew a little more about the actual issue, I guess I was wrong in that assumption. Anyway, I was just curious to see if maybe you had something substantially different but you dont so thats really all I wanted to find out. It just confirms that the methods that are planned are indeed still the best 2 options which is a good thing. If you come up with a better method or something just as good, I'd be willing to hear it. As for the AH and what its capable, its capable of anything. Its just a matter of developing it. There is no need to explore what its capable of because it can do anything. Its not limited at all. But the issue isnt what the AH is capable of or not. The issue is, what to do if the AH isnt even running. Something you havent fully considered yet with all of the possible ways to use that to a hackers advantage. Communication is key, I think you know that much, but just what to communicate, thats the part you are not yet up to speed on. Otherwise you'd realize why packet 17 or hardware identification is so vitally important (which you dont seem to understand yet, but I have faith, you will see it sooner or later).