Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP Posting-Version: version B 2.10.2 9/18/84 SMI; site sun.uucp Path: utzoo!watmath!clyde!burl!ulysses!allegra!bellcore!decvax!decwrl!sun!gnu From: gnu@sun.uucp (John Gilmore) Newsgroups: net.micro.mac Subject: Re: Disk Backup on the Macintosh Message-ID: <1941@sun.uucp> Date: Sun, 13-Jan-85 19:17:57 EST Article-I.D.: sun.1941 Posted: Sun Jan 13 19:17:57 1985 Date-Received: Tue, 15-Jan-85 01:29:12 EST References: <195@aluxp.UUCP> <183@gcc-opus.ARPA> Organization: Sun Microsystems, Inc. Lines: 22 In article <314159@foo.UUCP> bar@hack.UUCP (nUxi) writes: >I am posting a fast Unix dump program to net.sources. It seems to be able >to circumvent the permission bits on all of the disks I have tried to copy. > >This program, written by a friend, is being posted because of the recent >interest in backing up protected software. It is intended **only** for use >by persons who wish to exercise their legal right to produce archival copies >of software that they have purchased. It is **not* intended that this program >be used for unlawful purposes. > nUxi-matic As someone who makes their living off trade secret protected Unix software, I'm offended by your claim that this is "**not** intended that this program be used for unlawful purposes". Let's call a spade a spade. This program WILL be used to duplicate trade secret protected software, not always for backup purposes. Software WILL be ripped off by this program. I just had to set that straight. J C Gnu X-}