You submit to a process running on a web server - a CGI, ASP, CGI,whatever. These can access database, mail, whatever is needed. Irecommend only an experienced web developer familiar with the latestsecurity threats be considered for the task (unless it is for anintranet).Aandi Inston