So.... does configure figure out the necessary stuff for Linux shadow passwords or does it have to be done by hand?? If so, for the 'C' challenged, what exactly does one have to do. Thanks Michael