I see. I needed this purely for auditing computers on LAN - so no big danger of malicious clients.Granted, that's a bit of a contrived example, but as a rule I tend to feel that data like this should be configured centrally, rather than updated by clients. First rule of security: always assume your clients are malicious.