Memory usage

J. Landman Gay jacque at hyperactivesw.com
Thu Jul 4 15:35:31 EDT 2013


On 7/3/13 5:22 PM, Devin Asay wrote:

> Hey, just make up your own encryption scheme. I know a good one--
> A=1, B=2, C=3, etc. ;-)

It's even harder if you offset those by 2: A=3, B=4.

-- 
Jacqueline Landman Gay         |     jacque at hyperactivesw.com
HyperActive Software           |     http://www.hyperactivesw.com




More information about the use-livecode mailing list