Typically it is recommended that RSA be used to encrypt a symmetric key, which is then used to encrypt the \"payload\".
What is the practical (or theoretical) limit
Three years after you asked the question, I stumbled across your posting, because I just had to implement something similiar. What you will need in this case is an encryption mode to break the message into key sized chunks, because of the maximum message length. You will also need block padding to pad each block of the message (oposed to message padding that is usually applied to something like DES,3DES,AES). Not easy, but possible. You need to make sure that each padded block is smaller than the maximum allowed size. For block padding you could use for example OAEP or PKCS_V1_5. As encryption mode you could use ECB (not secure but works) or something more elaborated. (see wikipedia and encryption modes).
if you have a good crypto API you should be able to set the encryption mode and block/message padding and just throw the message at it.