I'm not a major hacker type, like you guys, but nobody mentioned the bytecode
strategy. Maybe that will work in your case.


Joe.

Reply via email to