Hi Walter,
>The first is that armadillo has a few protection mechanisms to protect its contents from debugging and memory dumping.
All the tools I know of protect against memory dumping from another process. In VFP we have the unique opportunity, though, to inject code into the process without going through any of the official interfaces. For example, you can modify any of the tables that the application uses and add an index expression that calls a UDF. The UDF would use SYS(2600) to read memory to its heart's content. Code injection is the biggest attack vector against protected VFP applications.
--
Christof