Newsgroups: comp.sys.atari.st.tech
Path: utzoo!utgpu!news-server.csri.toronto.edu!rpi!think.com!zaphod.mps.ohio-state.edu!menudo.uh.edu!uace0
From: uace0@menudo.uh.edu (Michael B. Vederman)
Subject: Re: Stealing vectors...  IT's already documented!
Message-ID: <1991May29.234238.24892@menudo.uh.edu>
Keywords: cookies XBRA
Organization: University of Houston
References: <1991May25.164250.5204@menudo.uh.edu> <1991May27.210056.14706@mks.com> <1991May29.190047.15959@wam.umd.edu>
Date: Wed, 29 May 1991 23:42:38 GMT

In article <1991May29.190047.15959@wam.umd.edu> cmedley@wam.umd.edu (Charles Henry Medley) writes:
>
>I have been unable to find out the exact specs on the "Cookie Jar" method for
>vector stealing.  I was wondering if anyone could give me a description... is
>this just the XBRA protocol?

Sorry, Flip!  The 'Cookie Jar' is not XBRA, or even remotely similar.

And, unfortunately, you can not get the information concerning the cooking
jar unless you are a developer (go tier 1 support and you'll get it).

See you at WAACE!  :-)

- mike

-- 
------------------------------------------------------------------------------
Double Click Me | Double Click Software | P.O. Box 741206 | Houston, Tx, 77274
------------------------------------------------------------------------------
Voice: (713)977-6520 | DC DESKTOP | DC FORMATTER | DC UTILITIES | and others
