I stand corrected!
Bob Sneidar
IT Manager
Logos Management
Calvary Chapel CM
On Mar 12, 2009, at 3:07 PM, Bill Marriott wrote:
Bob,
However, if he means create a multiuser network device scanning
utility
that can give you details on every device known to man, then somehow
decrypt every installed piece of software's license code,
interfaces with
all Office products from every age since it's inception, hacks
into the
NSA secure server, and bounces the data off a spy satellite, then of
course the answer would be, "nope."
There's nothing about that Rev can't do, though. It's just a lot
more work.
It's a matter of reverse engineering the various encryption schemes
and
APIs. After all, Revolution literally bounces data off satellites
every day.
http://www.runrev.com/products/testimonials/nasa/
_______________________________________________
use-revolution mailing list
use-revolution@lists.runrev.com
Please visit this url to subscribe, unsubscribe and manage your
subscription preferences:
http://lists.runrev.com/mailman/listinfo/use-revolution
_______________________________________________
use-revolution mailing list
use-revolution@lists.runrev.com
Please visit this url to subscribe, unsubscribe and manage your subscription
preferences:
http://lists.runrev.com/mailman/listinfo/use-revolution