On 11/16/06, Walter Banks wrote: > > I have seen both approaches protection and not. The only direct threat > is from someone that clones the full product. Protected or not these > folks will do it. Secondary protections are the only defence with these > guys. Simple undocumented features that can identify the code was > yours. Friend of mine used to scatter his name through the rom, a byte at a time. He had a listing of the locations in order, which if he was guessing, would have been less likely than winning the lottery. At verifone, we had a string in the Jr, Jr Plus, XL, and Tranz terminals that said "Nosy little F***** aren't you?" Yes, in a banking industry product.. -- http://www.piclist.com PIC/SX FAQ & list archive View/change your membership options at http://mailman.mit.edu/mailman/listinfo/piclist