Tilghman Lesher <[EMAIL PROTECTED]> said: >Given the closed source nature of the code in question, it is >impossible for anyone who does not have the source to be definitive >in their answer. > Hmm... If someone got $10 to burn and runs the installation procedure through 'strace -f' or similar? I bet they are using a system call, and I bet that with some smart system call redirection you can fool the software into thinking anything you like.
(and in case of emergency, simply hack the appropriate kernel drivers ;-)). Copy protection always was braindead, but it has been completely, utterly and absolutely braindead since the 80386. (fond memories of flipping through 'Programming the 80386' and hacking DOS software that never knew it was running inside our homebrew virtualization setup ;-)) -- Cees de Groot http://www.tric.nl <[EMAIL PROTECTED]> tric, the new way helpdesk/ticketing software, VoIP/CTI, web applications, custom development _______________________________________________ Asterisk-Users mailing list [EMAIL PROTECTED] http://lists.digium.com/mailman/listinfo/asterisk-users To UNSUBSCRIBE or update options visit: http://lists.digium.com/mailman/listinfo/asterisk-users