I stand corrected!

Bob Sneidar
IT Manager
Logos Management
Calvary Chapel CM

On Mar 12, 2009, at 3:07 PM, Bill Marriott wrote:

Bob,

However, if he means create a multiuser network device scanning utility
that can give you details on every device known to man, then  somehow
decrypt every installed piece of software's license code, interfaces with all Office products from every age since it's inception, hacks into the
NSA secure server, and bounces the data off  a spy satellite, then of
course the answer would be, "nope."

There's nothing about that Rev can't do, though. It's just a lot more work. It's a matter of reverse engineering the various encryption schemes and APIs. After all, Revolution literally bounces data off satellites every day.

http://www.runrev.com/products/testimonials/nasa/



_______________________________________________
use-revolution mailing list
use-revolution@lists.runrev.com
Please visit this url to subscribe, unsubscribe and manage your subscription preferences:
http://lists.runrev.com/mailman/listinfo/use-revolution


_______________________________________________
use-revolution mailing list
use-revolution@lists.runrev.com
Please visit this url to subscribe, unsubscribe and manage your subscription 
preferences:
http://lists.runrev.com/mailman/listinfo/use-revolution

Reply via email to