To prevent any collision from happening, all that is needed is to prefix the generated random key with some unique information, such as the computer name and the date/time. Then a random collision becomes impossible and a brute-force attack mandated. With longer, variable-length secrets and broader selection of characters, the chance of such an attack succeeding are sufficiently remote as to be safely ignored in most situations. Paul