hmmm, I didn&#39;t need to do that.<br><br><span style="color: black;"><div dir="ltr"><div>--<br>Fran, W1FJM<br><br><img src="http://farm5.static.flickr.com/4058/4705860669_03f33367ef_m.jpg" border="0"><br><br><img src="http://www.miele-family.com/weather/wxgraphic.php?type=banner" border="0"></div>

</div></span><br><br><div class="gmail_quote">On Wed, Aug 4, 2010 at 1:36 PM, Mike Heitmann <span dir="ltr">&lt;<a href="mailto:n0so@att.net">n0so@att.net</a>&gt;</span> wrote:<br><blockquote class="gmail_quote" style="margin: 0pt 0pt 0pt 0.8ex; border-left: 1px solid rgb(204, 204, 204); padding-left: 1ex;">

Reading the thread - it looks like you&#39;ve figured it out. That&#39;s great!<br>
<br>
An FYI for the group based on my experiences: Every Windows based machine I&#39;ve<br>
helped setup so far has required the operator to tell the virus<br>
scanner/mal-ware/firewall packages to allow the d-rats_repeater application to<br>
run before connections would be allowed. The method for doing this is different<br>
in each virus scanner/mal-ware/firewall program, and sometimes between different<br>
versions of the same package.<br>
<br>
Mike, N0SO<br>
Operating <a href="http://ratf.n0so.net:9000" target="_blank">ratf.n0so.net:9000</a><br>
<div><div></div><div class="h5">_______________________________________________<br>
drats_users mailing list<br>
<a href="mailto:drats_users@intrepid.danplanet.com">drats_users@intrepid.danplanet.com</a><br>
<a href="http://intrepid.danplanet.com/mailman/listinfo/drats_users" target="_blank">http://intrepid.danplanet.com/mailman/listinfo/drats_users</a><br>
</div></div></blockquote></div><br>