Compose your message:
Email Address :
Password:
OR
Your Name :
REAL Email Address :
(PRIVATE)
Subject :
Please type in your message (no HTML codes) :
[quote]On 05/15/2012 @ 01:01, Jim Drew wrote : Keep in mind that the custom copier just calls routines from the core code. Bounty Bob just requires half tracked writes that are interleaved so that wide head destroys areas not used. There was no real magic to this. Had they used more than 50% of the track (in each half track), it would have not been possible to use a CBM drive to write the data back. -- [/quote]
File to attach:
(limit 250000 bytes)
SECURITY QUESTION
I had 8 cows and then I misplaced 2 of them.
How many do I have now?
: