The publisher also creates an image of the full contents of the CD-ROM on his hard disk (this is the content as users will see it after the password has been entered). He does this simply by copying the unencrypted image and then adding the latest version of the problem database to it (because the problem database is the only thing that needs to be password-protected). |
|
|