| ??? 07/25/03 21:45 Read: times |
#51468 - RE: Reverse engineering Responding to: ???'s previous message |
What if the protocol is covered by a patent, DMCA, or other intellectual property law?
Intersting, I just read about it in Joe Kimbriels link and it seems that if the purpose is "to connect or interface" there are no restrictions. My read, you can check me. Erik |
| Topic | Author | Date |
| Reverse engineering | 01/01/70 00:00 | |
| RE: Reverse engineering | 01/01/70 00:00 | |
| RE: Reverse engineering | 01/01/70 00:00 | |
| RE: Reverse engineering | 01/01/70 00:00 | |
| RE: Reverse engineering | 01/01/70 00:00 | |
| RE: Reverse engineering | 01/01/70 00:00 | |
| RE: Reverse engineering | 01/01/70 00:00 | |
| RE: Reverse engineering | 01/01/70 00:00 | |
| RE: Reverse engineering | 01/01/70 00:00 | |
| RE: Reverse engineering | 01/01/70 00:00 | |
| RE: Reverse engineering | 01/01/70 00:00 | |
| RE: Reverse engineering | 01/01/70 00:00 | |
| RE: Reverse engineering | 01/01/70 00:00 | |
| RE: Reverse engineering | 01/01/70 00:00 | |
| RE: Reverse engineering | 01/01/70 00:00 | |
| RE: Reverse engineering | 01/01/70 00:00 | |
| RE: Reverse engineering | 01/01/70 00:00 | |
| RE: Reverse engineering (exception) | 01/01/70 00:00 | |
| RE: Reverse engineering (exception) | 01/01/70 00:00 | |
RE: Reverse engineering (exception) | 01/01/70 00:00 |



