Hi
Ok. The computers will have an extra processor or bit of software that
will scan the binary for tampering. The computer records the date and
time the original binary was downloaded. If it detects tampering the
computer releases an acid canestor which destroys all major components
plus the hard drive making the whole thing unuseable.
Josh
---
Gamers mailing list __ Gamers@audyssey.org
If you want to leave the list, send E-mail to gamers-unsubscr...@audyssey.org.
You can make changes or update your subscription via the web, at
http://audyssey.org/mailman/listinfo/gamers_audyssey.org.
All messages are archived and can be searched and read at
http://www.mail-archive.com/gamers@audyssey.org.
If you have any questions or concerns regarding the management of the list,
please send E-mail to gamers-ow...@audyssey.org.