Compose your message:
Email Address :
Password:
OR
Your Name :
REAL Email Address :
(PRIVATE)
Subject :
Please type in your message (no HTML codes) :
[quote]On 03/07/2007 @ 09:58, JimDrew wrote : Since the object to duplicating protection is being able to determine the write spice(s), it is important to be able to read the track and shift the data to determine where the splice occurs. The only thing we are concerned about is this. With the EPYX stuff (perhaps others), the "weak bits" created by the write splice is actually checked as part of the protection. They expect this data to change and never be the same or it won't load. They use this point to start their data reads when loading/sending their data too. : -- [/quote]
File to attach:
(limit 250000 bytes)
SECURITY QUESTION
I had 3 chihuahuas and then I let go 2 of them.
How many do I have now?
: