On Mar 17, 2009, at 8:49 PM, Jonas Lopez wrote: > This worked just fine,
Good, problem solved. > BUT as we all like to learn, A premise disproved by a single example, G.W. Bush. > I opened the file using MSword, MSword? Some kind of Multi-Sword application for cleaving open files? > which will open any file, Any file? Sounds like a must have application. > and it was empty. Where was the code stored? Raiders must have gotten there first and stolen the code! It used to be all the good stuff was located in or near the Plover Room. That was long ago and the twisty little passages looked all alike, so I could be wrong? If you get the code, what will you do with it? Sell it? Hold it for ransom? Plunder the bits? Seriously, problem solved. The password will be encrypted, so it's unlikely you'd be able to "learn" anything from the encrypted "code" unless you plan on trying to krack the encryption algorithm, a subject not appropriate for this list. --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed Low End Mac's G3-5 List, a group for those using G3, G4, and G5 desktop Macs - with a particular focus on Power Macs. The list FAQ is at http://lowendmac.com/lists/g-list.shtml and our netiquette guide is at http://www.lowendmac.com/lists/netiquette.shtml To post to this group, send email to [email protected] To unsubscribe from this group, send email to [email protected] For more options, visit this group at http://groups.google.com/group/g3-5-list?hl=en Low End Mac RSS feed at feed://lowendmac.com/feed.xml -~----------~----~----~----~------~----~------~--~---
