Hi

Ok. The computers will have an extra processor or bit of software that will scan the binary for tampering. The computer records the date and time the original binary was downloaded. If it detects tampering the computer releases an acid canestor which destroys all major components plus the hard drive making the whole thing unuseable.
Josh

---
Gamers mailing list __ Gamers@audyssey.org
If you want to leave the list, send E-mail to gamers-unsubscr...@audyssey.org.
You can make changes or update your subscription via the web, at
http://audyssey.org/mailman/listinfo/gamers_audyssey.org.
All messages are archived and can be searched and read at
http://www.mail-archive.com/gamers@audyssey.org.
If you have any questions or concerns regarding the management of the list,
please send E-mail to gamers-ow...@audyssey.org.

Reply via email to