Bill Vlahos wrote:
3. How strong is the encryption that is built into the locking stack password?
It's said to be a derivative of DES. In lay terms, an experience crypto-hobbyist could probably crack it in a weeked, or so I'm told.
4. Is doing this in a stack the right approach or would it be better to have a binary data file like more traditional programs? If a data file is the right way to go, how can that be protected?
Rev 2.5 has industrial-strength encryption built-in. I haven't used it myself yet, but I believe there are example files in Rev Online....
-- Richard Gaskin Fourth World Media Corporation ___________________________________________________________ [EMAIL PROTECTED] http://www.FourthWorld.com _______________________________________________ use-revolution mailing list [EMAIL PROTECTED] http://lists.runrev.com/mailman/listinfo/use-revolution
