syosoft02-20-2010, 03:21 PMThe only real solution is to do it IP based in some sort of table separate from the users table for brute force on an unknown account and to also use a users table solution for brute force password attacks on a known account.