Beefy Boxes and Bandwidth Generously Provided by pair Networks
go ahead... be a heretic

Re: Re: Protecting perl source code

by tame1 (Pilgrim)
on Jul 22, 2002 at 14:48 UTC ( #184080=note: print w/replies, xml ) Need Help??

in reply to Re: Protecting perl source code
in thread Protecting perl source code

Exactly 0 copies. After my experience there, the last thing I wanted was to be dealing with him in the future about software theft. These 6.5 hours are even annoying, as I had high hopes of never having to respond to an email of his.

The initial idea was for the system to be either an appliance or an ASP. In either case, we controlled access. I guess for his next company he's planning something else.

I can chase my tail for 6.5 hours very easily. Once that is done, I am done with him. Fini!

What does this little button do . .<Click>; "USER HAS SIGNED OFF FOR THE DAY"

Log In?

What's my password?
Create A New User
Node Status?
node history
Node Type: note [id://184080]
and the web crawler heard nothing...

How do I use this? | Other CB clients
Other Users?
Others drinking their drinks and smoking their pipes about the Monastery: (8)
As of 2016-10-21 21:35 GMT
Find Nodes?
    Voting Booth?
    How many different varieties (color, size, etc) of socks do you have in your sock drawer?

    Results (291 votes). Check out past polls.