Nymboy has software that is protected by an access control mechanism.  For some reason (either malfunction, corrupt data, or plain failure) the program fails to give Nymboy access to the program and stored data.  Nymboy tries to find the software company but cannot locate the company and figures it went out of business.  Can Nymboy circumvent the technology in order to get to the data he has stored using the program?




<<     >>