Hello,

I am going to add low-level-approach of DBF manipulation based on Apollo
(AKA Six) DBDF stuffs. This is not an RDD, but a real DBF low-level
acsess. Nothing is inhereted from the RDD base source.

If there's a contra on this, please speak.

Andi


------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
xHarbour-developers mailing list
xHarbour-developers@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/xharbour-developers

Reply via email to