->> did you REALLY publically post the availability and whereabouts
->> of registered only software? software that requires registration
->> before access to it is given? ;-{
TP> It won't run without a key...
point is, that's all any hacker needs... access to the registered version and
then just run it over and over until it is hacked thru... then just write a
program to alter the bytes he changed manually release it and POOF, we have
yet another #$%^&@ hacked software package out there |-{
real friggin' bright... it's no wonder that authors are dropping software
left and right... ;-(
)\/(ark
---------------
* Origin: (1:3634/12)
|