home *** CD-ROM | disk | FTP | other *** search
Wrap
Received: from ix3.ix.netcom.com (ix3.ix.netcom.com [199.182.120.5]) by nacm.com (8.6.10/8.6.9) with ESMTP id FAA05951 for <executor@nacm.com>; Wed, 7 Jun 1995 05:45:47 -0700 Received: from ix-det3-09.ix.netcom.com by ix3.ix.netcom.com (8.6.12/SMI-4.1/Netcom) id FAA15214; Wed, 7 Jun 1995 05:45:28 -0700 Date: Wed, 7 Jun 1995 05:45:28 -0700 Message-Id: <199506071245.FAA15214@ix3.ix.netcom.com> X-Sender: STUFRIED@MAIL1.IX.NETCOM.COM X-Mailer: Windows Eudora Version 1.4.4 Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" To: executor@nacm.com From: STUFRIED@ix.netcom.com (Stuart Friedman) Subject: To ID Executor to Programs or Not Sender: owner-paper@nacm.com Precedence: bulk It seems to me that if a programmer really has his/her heart set at stopping Executor from running their program, they can easily do so. I am not sure that the ROM trick mentioned in a prior post will work or not given programs like MAE and platforms like PREP. With all due respect, it seems to me that Executor will have to sell a great deal more copies before it needs to worry about Apple (the most likely company to write an Anti-Executor routine in their program). If such a routine crops up, the user will then have to make the decision of whether the routine is there for a good reason, or a malicious one (viruses excepted). If this becomes a problem, a patch would seem pretty easy. Conversely, it seems like the ability for a program to identify Executor might offer the companies an easy way to implement simple work arounds where necessary. ------------------------------------------------------------ | Stuart G. Friedman StuFried@IX.NETCOM.COM | | Livonia (Detroit), MI | ------------------------------------------------------------