Quote:
Originally Posted by Barkhorn1x
Hey Rockin. Good to see you again.
Here is a link to a PDF file of 3 different attack methods that we worked on about 10 years ago.
https://mega.nz/#F!rvZ3EYhL
|
Super! It's all locked up with a super secret encryption key though.