Don't laugh, brainstorming here (hopefully not a re-hash of what has been done) -
  • How does the Tokenizing Engine work?
  • How is this information cached?
  • Are there any external files like WIN386.SWP that may need to be purged or have support issues with?
  • Are these files compiled to say an EXE? If so, is there an option to decompile?
  • If tokenizing into an EXE, is the WKIX32/KIX32 file included or are thesed "called"? This would be like the KiXCrypt program used today.
  • Is there an included TSR program, or is this a simple call, complete the script, and close?
  • What about security? Mapping LPT1 in XP, for example requires Admin Rights.
  • How much of a speed increase would we see?
  • Is this only for the WKIX32.EXE file or does this cover the KIX32.EXE too?
Kent
_________________________
Utilize these resources:
UDFs (Full List)
KiXtart FAQ & How to's