On Wed, Jul 28, 2010 at 23:48:57 -0400, Paul Allen Newell <pnewell@xxxxxxxxxx> wrote: > > If doing a "black-box" only job of "reverse engineering" requires one to > load memory with a trademark, how does this fall into the realm of > acceptable? There was a court case where a company was using a copyrighted phrase for access control. A competitor won when they also used the same phrase for access control purposes. That was a long time ago and people seemed to feel that when a customer bought something, they owned it. In today's environment that case might have gone differently. -- users mailing list users@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe or change subscription options: https://admin.fedoraproject.org/mailman/listinfo/users Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines