Dave Mullenix wrote: > I assume that anybody who wishes to compromise the security on a PIC > chip for nefarious purposes already knows how to do it, so no cats > will be let out of the bag by divulging the general method here. I don't follow your logic here, Dave... Your purposes are -- presumably -- educational only, but YOUR wish to know hasn't magically given you the information, right? How do you figure that it's any different for "nefarious" persons? -Andy Andrew Warren - fastfwd@ix.netcom.com Fast Forward Engineering, Vista, California http://www.geocities.com/SiliconValley/2499