Hello, I am going to add low-level-approach of DBF manipulation based on Apollo (AKA Six) DBDF stuffs. This is not an RDD, but a real DBF low-level acsess. Nothing is inhereted from the RDD base source.
If there's a contra on this, please speak. Andi ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ xHarbour-developers mailing list xHarbour-developers@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/xharbour-developers