Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP
Posting-Version: version B 2.10.2 9/18/84 SMI; site sun.uucp
Path: utzoo!watmath!clyde!burl!ulysses!allegra!bellcore!decvax!decwrl!sun!gnu
From: gnu@sun.uucp (John Gilmore)
Newsgroups: net.micro.mac
Subject: Re: Disk Backup on the Macintosh
Message-ID: <1941@sun.uucp>
Date: Sun, 13-Jan-85 19:17:57 EST
Article-I.D.: sun.1941
Posted: Sun Jan 13 19:17:57 1985
Date-Received: Tue, 15-Jan-85 01:29:12 EST
References: <195@aluxp.UUCP> <183@gcc-opus.ARPA>
Organization: Sun Microsystems, Inc.
Lines: 22

In article <314159@foo.UUCP> bar@hack.UUCP (nUxi) writes:
>I am posting a fast Unix dump program to net.sources.  It seems to be able
>to circumvent the permission bits on all of the disks I have tried to copy.
>
>This program, written by a friend, is being posted because of the recent
>interest in backing up protected software.  It is intended **only** for use
>by persons who wish to exercise their legal right to produce archival copies
>of software that they have purchased.  It is **not* intended that this program
>be used for unlawful purposes.
>                                                nUxi-matic

As someone who makes their living off trade secret protected Unix
software, I'm offended by your claim that this is "**not** intended
that this program be used for unlawful purposes".

Let's call a spade a spade. This program WILL be used to duplicate
trade secret protected software, not always for backup purposes.
Software WILL be ripped off by this program.

I just had to set that straight.

J C Gnu									  X-}