On Mar 17, 2009, at 8:49 PM, Jonas Lopez wrote:

> This worked just fine,

Good, problem solved.

> BUT as we all like to learn,

A premise disproved by a single example, G.W. Bush.

> I opened the file using MSword,

MSword? Some kind of Multi-Sword application for cleaving open files?

> which will open any file,

Any file? Sounds like a must have application.

> and it was empty. Where was the code stored?

Raiders must have gotten there first and stolen the code! It used to  
be all the good stuff was located in or near the Plover Room. That was  
long ago and the twisty little passages looked all alike, so I could  
be wrong? If you get the code, what will you do with it? Sell it? Hold  
it for ransom? Plunder the bits?

Seriously, problem solved. The password will be encrypted, so it's  
unlikely you'd be able to "learn" anything from the encrypted "code"  
unless you plan on trying to krack the encryption algorithm, a subject  
not appropriate for this list.

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed Low End Mac's G3-5 List, a 
group for those using G3, G4, and G5 desktop Macs - with a particular focus on 
Power Macs.
The list FAQ is at http://lowendmac.com/lists/g-list.shtml and our netiquette 
guide is at http://www.lowendmac.com/lists/netiquette.shtml
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to 
[email protected]
For more options, visit this group at 
http://groups.google.com/group/g3-5-list?hl=en
Low End Mac RSS feed at feed://lowendmac.com/feed.xml
-~----------~----~----~----~------~----~------~--~---

Reply via email to