> Yeah - I don't think that one is too difficult. There's more to it
> than you've shown of course - there's code to populate the lists and
> to setup the columns to use them for example.
I mean we should reduce redundant code, reuse existed code as possible.
The hackers should cooperate when working on that functions with similar components.
-----------------------------------------------
Quan Zongliang
quanzongliang(at)gmail(dot)com
CIT Japan: http://www.cit.co.jp
CIT China: http://www.citbj.com.cn