I would be interested in knowing how you manage it, to be honest. Unless it's some wicked exploit or haxx, I see no problem with it. Just curious how it is done.