On Wed, Nov 01, 2000 at 12:43:26AM -0800, Penguin wrote:
>   Never Mind guys.
> 
>   It is damn license.
> 
>   Thanks a lot for some of you guys who replied to me.
just a suggestion: you said the algorithm to authenticate i proprietary
so they cannot give you sources, but it doesn't mean you cannot make
some reverse engeneering to packets sents to the authetication server ( i 
think it'll work like this client connect to a server , it authenticates
itself and then it can go outside the firewall ).
Just look to the license and watch if it's prohibited to watch HOW it works.
if not then you can make you own "clone" in Linux 

c ya
Samuele 

-- 
Samuele Tonon  <[EMAIL PROTECTED]>
Undergraduate Student  of  Computer Science at  University of Bologna, Italy    
System administrator at Computer Science Lab's, University of Bologna, Italy  
Founder & Member of A.A.H.T.
UIN 3155609 
                Acid -- better living through chemistry.
                               Timothy Leary

Reply via email to