Google Answers Logo
View Question
 
Q: Please Proof-read my website ( Answered 5 out of 5 stars,   0 Comments )
Question  
Subject: Please Proof-read my website
Category: Business and Money > Advertising and Marketing
Asked by: jonathanclark-ga
List Price: $75.00
Posted: 16 Jul 2003 01:44 PDT
Expires: 15 Aug 2003 01:44 PDT
Question ID: 231541
I need someone to proof read all of the pages at my website:
http://thinstall.com

There are approximately 120 pages that need to be read, the bulk are
located under the URL:
http://thinstall.com/help

I do not need the following sections proof read:
- Discussion Board
-	Mailing List
-	PDF Manual & Windows Help Manual (these are the same as the Online
Version)

I'm looking for the following corrections:
- Spelling & gross grammar errors
- Pointing out sentences or phrases that make no sense or look
"unprofessional"

I'm not looking an "English teacher" level of analysis where every
sentence must be perfection embodied, but rather help making sure my
customers are not turned away by something less than professional looking.
 I’m expecting a small number of corrections per page and many pages
that need no corrections.  You are free to add additional suggestion
if you like – but this is not required.

For corrections, please specify the URL of the page, followed by a
small block of text that needs to be changed.  Please note the help/
pages are inside frames so you need to right-click on the frame in
question to get the correct URL.

Example of a real error:

http://thinstall.com/help/contractconsultingservices.htm:  We also
check to make sure you **(you should be your)** application installs
and runs properly on all versions of 32bit Windows.

I’m not sure how google answers works in regards to locking answers –
but I image this will take the researcher more than one day to
complete.  If you begin working on this and are unable to lock it for
the period of time you need – please post a clarification and I will
ask all other researchers to wait until the original research has
finished or 1 week goes by.

For the help/ section you may find it easier to download all the files
using this ZIP file:
http://thinstall.com/downloads/help_2018.zip

I thought I’d post here instead of trying a professional proof-reading
service because I’m not looking for in-depth analysis, and I’m usually
very satisfied with the work of google researchers.

Request for Question Clarification by belindalevez-ga on 17 Jul 2003 04:01 PDT
I have started working on your question and anticipate it will take
approximately 2 days to complete. I will give you a further update
about the progress that I am making.

Request for Question Clarification by belindalevez-ga on 17 Jul 2003 11:38 PDT
I amm making good progress and will post an answer tomorrow.
Answer  
Subject: Re: Please Proof-read my website
Answered By: belindalevez-ga on 18 Jul 2003 05:38 PDT
Rated:5 out of 5 stars
 
<I have highlighted the incorrect parts of the sentences using an
asterisk on each side of the error. The sentence is then written
correctly underneath. If anything is not clear please ask for a
clarification.

http://thinstall.com/help/introduction.htm
The Virtual Operating System (VOS) *supliments* the windows system
loader.
The Virtual Operating System (VOS) supplements the windows system
loader.

COM and ActiveX controls can be loaded directly from the VFS,
eliminating *allow posibility* they might be removed by another
application's uninstall.
COM and ActiveX controls can be loaded directly from the VFS,
eliminating allows the possibility they might be removed by another
application's uninstall.

Virtual registry exists inside your EXE, so it cannot be misconfigured
by another program's *installer / uninstaller*.
Virtual registry exists inside your EXE, so it cannot be misconfigured
by another program's installer/uninstaller.

Install/Uninstall remains *intergrated* with your EXE  
Install/Uninstall remains integrated with your EXE  

http://thinstall.com/help/supportedplatforms.htm
Thinstall should be *compatabile* with future versions of Windows 
Thinstall should be compatible with future versions of Windows
		

Thinstall supports most Win32 based EXE and DLL files, with some
*exception* listed below:
Thinstall supports most Win32 based EXE and DLL files, with some
exceptions listed below:

http://thinstall.com/help/versionoptions.htm
This string replaces %VersionId% in macro *expandaded* filenames.
This string replaces %VersionId% in macro expanded filenames.

When Thinstall automatically calculates a version number it uses
newest the last-modified date from all the files in your project*.
I.e. The* file date from the last file you edited/changed.

When Thinstall automatically calculates a version number it uses
newest the last-modified date from all the files in your project, i.e.
the file date from the last file you edited/changed.

http://thinstall.com/help/licensedisplay.htm
Controls the *license / warranty* dialog box.
Controls the license/warranty dialog box.

http://thinstall.com/help/uninstalloptions.htm
During install and during the course of running your program,
Thinstall may need to create new subdirectories. If these directories
did not previously *exists*.

During install and during the course of running your program,
Thinstall may need to create new subdirectories if these directories
did not previously exist.

If this option is selected, Thinstall will add any cache file it
creates to the uninstall log file which causes them to be *delete*
during uninstall.

If this option is selected, Thinstall will add any cache file it
creates to the uninstall log file which causes them to be deleted
during uninstall.

If you change the uninstall log file location to ** path that does not
*exists* or write permission is not allowed, logging *infomation* will
be silently thrown away and the uninstall process will leave files
behind.

If you change the uninstall log file location to a path that does not
exist or write permission is not allowed, logging information will be
silently thrown away and the uninstall process will leave files
behind.

If a shortcut is added to the StartMenu for the program icon, this
option controls *weather* or not an uninstall icon should also be
added.

If a shortcut is added to the StartMenu for the program icon, this
option controls whether or not an uninstall icon should also be added.

http://thinstall.com/help/dlllinking.htm
*Dlls* loaded *implicitily* by your program are those listed in a
program's EXE Import Table.
DLLs loaded implicitly by your program are those listed in a program's
EXE Import Table.

*Implicity* linked DLLs may contain a thread local storage section,
while *dyncamically* loaded DLLs cannot.
Implicitly linked DLLs may contain a thread local storage section,
while dynamically loaded DLLs cannot.

*Dlls* loaded during program runtime are dynamically loaded DLLs.
DLLs loaded during program runtime are dynamically loaded DLLs.

A different font has been used for this section.
Thinstall calls DllMain callbacks for

When Thinstall loads a DLL, it will check for *dependiences* on other
DLLs and load them if needed.
When Thinstall loads a DLL, it will check for dependences on other
DLLs and load them if needed.

http://thinstall.com/help/virtualfiles.htm
Virtual files remain in the compressed archive form in your EXE
package, *the* do not need to extract to disk.
Virtual files remain in the compressed archive form in your EXE
package, they do not need to extract to disk.

Thinstall provides transparent read decompression . As your program
reads the file, Thinstall *decompressed* small chunks of the file in
memory and provides it directly to the application read buffers.
Thinstall provides transparent read decompression . As your program
reads the file, Thinstall decompresses small chunks of the file in
memory and provides it directly to the application read buffers.

http://thinstall.com/help/clip0016.jpg
Extracting / Caching
Extracting/Caching

Cache on write / memmap
Cache on write/memmap

Extract on write / memmap
Extract on write/memmap

http://thinstall.com/help/extraction_caching.htm
The installer *most* be included to use this option.
The installer must be included to use this option.

Don't delete cache / extraction
Don't delete cache/extraction

If cache encryption is turned on, the files contents will be
transparently encrypted so the application *see* a normal file, but
external applications will see garbage.
If cache encryption is turned on, the files contents will be
transparently encrypted so the application sees a normal file, but
external applications will see garbage.

Because of this, encryption should not be used to store highly
confidential information where monetary *lose* could result in the
contents being disclosed.
Because of this, encryption should not be used to store highly
confidential information where monetary loss could result in the
contents being disclosed.

http://thinstall.com/help/cachingversusextraction.htm
If virtual path points to a drive letter that does not *exists* or
points to a read-only location such as CDROM, this option will fail.
If virtual path points to a drive letter that does not exist or points
to a read-only location such as CDROM, this option will fail.

After the file has *be* extracted the application will receive a file
handle to the "cache file".
After the file has been extracted the application will receive a file
handle to the "cache file".

Real Files *ystem*
Real Files system

Extraction *enbabled*
Extraction enabled

Diagram
Does cache file *exists*?
Does cache file exist?

http://thinstall.com/help/duplicatefiledetection.htm
Files marked as "Extract on Write" or "Cache on Write" will produce 2
*separate* files on the hard drive if they are written to.
Files marked as "Extract on Write" or "Cache on Write" will produce 2
separate files on the hard drive if they are written to.

Some programs *operately different* based on their filename.
Some programs operate differently based on their filename.

For example a program named "zip.exe" may *perform* different actions
when it is renamed to "unzip.exe".
For example a program named "zip.exe" may perform different actions
when it is renamed to "unzip.exe".

http://thinstall.com/help/exelinking.htm
This main EXE can *chose* to run other bundled EXEs using
CreateProcess or ShellExecute.
This main EXE can choose to run other bundled EXEs using CreateProcess
or ShellExecute.

When a secondary EXE is loaded by Thinstall (any EXE inside the
archive other than the main EXE), a small stub file will ** created in
the TEMP directory.
When a secondary EXE is loaded by Thinstall (any EXE inside the
archive other than the main EXE), a small stub file will be created in
the TEMP directory.

Doesn’t make sense.
For example in C++ system and execv could be used.

http://thinstall.com/help/modulesearchpath.htm
Doesn’t make sense.
This option should not be used if your application might possible need
to more than one DLL with the same filename, but different paths.

http://thinstall.com/help/createprocessshellexecuteo.htm 
Using the Win32 API function SetEnvironmentVariable causes the
environment variable to set in all threads, so if your program has two
or more threads that might call CreateProcess at the same **, you
should place a thread-lock around the code section.
Using the Win32 API function SetEnvironmentVariable causes the
environment variable to set in all threads, so if your program has two
or more threads that might call CreateProcess at the same time, you
should place a thread-lock around the code section.

http://thinstall.com/help/commandlinearguments.htm
By *specify* a command line argument with the name of the bundled
file, the mp3 will begin playing when the user runs the EXE file.
By specifying a command line argument with the name of the bundled
file, the mp3 will begin playing when the user runs the EXE file.

http://thinstall.com/help/makingatrialdemo.htm
Thinstall allows you to distribute time limited trial versions of your
software that can be upgraded by *inputing* a serial number provided
upon purchase
Thinstall allows you to distribute time limited trial versions of your
software that can be upgraded by inputting a serial number provided
upon purchase

http://thinstall.com/help/enablingtrialdemocapabiliti.htm
Downsides: Locking to the Drive C Serial Number *will* requires the
user to obtain a new key if they upgrade their hard-drive.
Downsides: Locking to the Drive C Serial Number requires the user to
obtain a new key if they upgrade their hard-drive.

http://thinstall.com/help/customizingdemomessages.htm
Blank page.

http://thinstall.com/help/accessingtrialinformation.htm
Accessing Trial *Infromation* from your program. 
Accessing Trial Information from your program. 

TS_SERIAL will be a 32-bit integer, and you may use bits of the serial
number to represent *addition* features.
TS_SERIAL will be a 32-bit integer, and you may use bits of the serial
number to represent additional features.

http://thinstall.com/help/read_order.htm
Thinstall will check to see if a cached version of the file *exist* in
the cache directory.
Thinstall will check to see if a cached version of the file exists in
the cache directory.

If the cached version of the file *exist*, Thinstall will open the
cached version and return it to the application.
If the cached version of the file exists, Thinstall will open the
cached version and return it to the application.

If no cached version of the file *exist*, Thinstall will open the file
using the compressed copy stored in the EXE.
If no cached version of the file exists, Thinstall will open the file
using the compressed copy stored in the EXE.

If the application opened the file for writing and no cached version
*exist*, then Thinstall will decompress the internal version to the
specified cache directory and open that file.
If the application opened the file for writing and no cached version
exists, then Thinstall will decompress the internal version to the
specified cache directory and open that file.

http://thinstall.com/help/dllocxregistration.htm
A system reboot is never required even if older versions of the
component are in use by other *applicaitons*.
A system reboot is never required even if older versions of the
component are in use by other applications.

Thinstall intercepts all of the *applicaitons* registry, COM, and
ActiveX activity so that it will access the virtual registry first.
Thinstall intercepts all of the applications registry, COM, and
ActiveX activity so that it will access the virtual registry first.
System Extract / System Register
System Extract/System Register

Overwrite disk version if newer internal is *enablabe*
Overwrite disk version if newer internal is enabled

The yes, no, maybe’s of the table ‘Differences between Virtual
Registration and System Registration’ are not vertically aligned.

Don't delete extraction / Cache during Install
Don't delete extraction/Cache during Install

1.	Check the %systemsystem% directory to see if the DLL/OCX file
already *exist*.
1.	Check the %systemsystem% directory to see if the DLL/OCX file
already exists.

"No Extract/Virtual Pre-Register"
"No Extract/Virtual Pre-Register"

"No Extract/No Registration"
"No Extract/No Registration"

http://thinstall.com/help/clip0100.jpg
Thinstall's Virtual Registry system exists as a *seperate* module that
is linked with your project
when one or more registry script files exists in your project.
Thinstall's Virtual Registry system exists as a separate module that
is linked with your project
when one or more registry script files exists in your project.

Virtual Registry Keys are persistant across executions, and any
changes made to them by the program will be *forgetten* when the
application quits.
Virtual Registry Keys are persistant across executions, and any
changes made to them by the program will be forgotten when the
application quits.

http://thinstall.com/help/importingregedit_regscripts.htm
*There* programs should be installed on all Windows system.
These programs should be installed on all Windows system.

You should edit the .threg if any registry keys look like they refer
to path locations that will be different when *you* software is
running.
You should edit the .threg if any registry keys look like they refer
to path locations that will be different when your software is
running.

http://thinstall.com/help/addingcomactivexcontrols.htm
Next, decide *how* if your control will be shared with other
applications, or only used by your application (Private)**
Next, decide if your control will be shared with other applications,
or only used by your application (Private).

http://thinstall.com/help/comactivexinstallationhel.htm
The links on this page are not working.

If write permission to the file is not allowed, then *on* of the two
is probably true:
If write permission to the file is not allowed, then one of the two is
probably true:

There is no reliable way to detect if other *application* are still
using shared components you installed, so the only safe thing to do is
leave the component behind on uninstall.
There is no reliable way to detect if other applications are still
using shared components you installed, so the only safe thing to do is
leave the component behind on uninstall.

The Thinstall Virtual Machine, only 100-200k in size, *consist* of 3
core technologies:
The Thinstall Virtual Machine, only 100-200k in size, consists of 3
core technologies:

http://thinstall.com/help/customerquotes.htm
The second quote is not in alignment with the others. It is necessary
to scroll across the page to read it.

http://thinstall.com/help/programsecurity.htm
Factors influencing if your application *if your application* may be
compromised:
Factors influencing if your application may be compromised:

How *many* popular is the application?
How popular is the application?

Operation can be *preformed* with standard tools without a large
amount of work or *technical* *knowedge*.
Operation can be performed with standard tools without a large amount
of work or technical knowledge.

Operation can be *preformed* by a moderately skilled attacker with a
high level of *persistance*.
Operation can be performed by a moderately skilled attacker with a
high level of persistence.

Operation can be *preformed* by a highly skilled attacker with a
moderate level of *persistance*.
Operation can be performed by a highly skilled attacker with a
moderate level of persistence.

Operation can only be *preformed* by a highly skilled attacker with
intensive study.
Operation can only be performed by a highly skilled attacker with
intensive study.

End of sentence/link missing.
3rd party DLLs can be restricted from accessing a list of files in the
application by

File contents may ** located in memory and dumped to disk.
File contents may be located in memory and dumped to disk.

Link missing.
For example "C" of one implementation of a secure license control
system using Thinstall, visit this link:

Broken link
PE Header destruction

http://thinstall.com/help/dotnetloadsecurity.htm
Other software components that need to access parts of your EXE *they*
may fail to work with this option enabled, so it is disabled by
default for maximum compatibility.
Other software components that need to access parts of your EXE may
fail to work with this option enabled, so it is disabled by default
for maximum compatibility.

http://thinstall.com/help/externaldllloading.htm
If *you* application needs to load 3rd party DLLs there is a small
chance that some of these DLLs will misbehave when modified by
Thinstall.
If your application needs to load 3rd party DLLs there is a small
chance that some of these DLLs will misbehave when modified by
Thinstall.

http://thinstall.com/help/visibility.htm
diagram
*Invsbible* to Shell components
Invisible to Shell components

This keeps files hidden from the user's view, as most likely *vritual*
files are intended to be used solely by the application, not the user.
This keeps files hidden from the user's view, as most likely virtual
files are intended to be used solely by the application, not the user.

http://thinstall.com/help/hardwarekeyofflineussage.htm
When at your desk, you can conserve USB ports by automatically
reverting to network *ussage*.
When at your desk, you can conserve USB ports by automatically
reverting to network usage.

Download and *installl* any trial version of Thinstall 1.995 or
higher.
Download and install any trial version of Thinstall 1.995 or higher.

http://thinstall.com/help/enteringyourregistrationkey.htm
Single user license illustration.
Please feel ** to email
Please feel free to email

The Key has a light that will turn on when your computer *reconginzes*
the device**
The Key has a light that will turn on when your computer recognizes
the device.

http://thinstall.com/help/exemayfailtorunbecausefi.htm
Some *program* perform actions based on their EXE name and will fail
to run when renamed in this fashion.
Some programs perform actions based on their EXE name and will fail to
run when renamed in this fashion.

http://thinstall.com/help/_netprogramsusingthenxmlp.htm
Link not working to http://thinstall.com/help/createprocessshellexecuteo.htm

http://thinstall.com/help/clip0113.jpg
Some versions of Microsoft Windows allow you to right click on an EXE
and set a *compatability* mode option:
Some versions of Microsoft Windows allow you to right click on an EXE
and set a compatibility mode option:

Always make sure the *Compatability* mode is disabled for Thinstall
generated programs.
Always make sure the Compatibility mode is disabled for Thinstall
generated programs.

http://thinstall.com/help/recordedcomcontrolregistry.htm
The control should delete all registry keys it placed in your registry
it might have placed *their* previously.
The control should delete all registry keys it placed in your registry
it might have placed there previously.

The control should create all registry keys it *need* during this
process.
The control should create all registry keys it needs during this
process.

http://thinstall.com/help/support.htm
Broken link http://thinstall.com/help/BuildReleaseStrategy.html

this should *effect* very few people.  
this should affect very few people.  

http://thinstall.com/help/sharedsegments.htm
Thinstall does not support shared memory *segments,so* this should be
accomplished
using anonymous memory mapped files.
Thinstall does not support shared memory segments, so this should be
accomplished
using anonymous memory mapped files.

http://thinstall.com/help/visualbasicruntimelinking.htm
If you have already recorded a virtual registry script for your
DLL/OCX (.threg file), then *chose* this option.
If you have already recorded a virtual registry script for your
DLL/OCX (.threg file), then choose this option.

If you have a specific file that you are concerned about *security /
hacking*, you can change this to "Invisible to Search/Enum".
If you have a specific file that you are concerned about
security/hacking, you can change this to "Invisible to Search/Enum".

http://thinstall.com/help/languagelocalization2.htm
For .NET programs, Thinstall will *detected* needed system
requirements before running the program.
For .NET programs, Thinstall will detect needed system requirements
before running the program.

Because the URL can be customized for each language, you can direct
*user's* to a download page in their native language.
Because the URL can be customized for each language, you can direct
users to a download page in their native language.

The size of *a* various windows can be customized.
The size of various windows can be customized.

http://thinstall.com/help/specifyconfigurationfile.htm
By default Thinstall *load* configuration data from the file:
By default Thinstall loads configuration data from the file:

http://thinstall.com/help/extractioncachingoptions.htm
If cache encryption is turned on, the *files* contents will be
transparently encrypted so the application *see* a normal file, but
external applications will see garbage.
If cache encryption is turned on, the file’s contents will be
transparently encrypted so the application sees a normal file, but
external applications will see garbage.

Because of this, encryption should not be used to store highly
confidential information where monetary *lose* could result in the
contents being disclosed.
Because of this, encryption should not be used to store highly
confidential information where monetary loss could result in the
contents being disclosed.

http://thinstall.com/help/command_lineversion.htm
*Senerio* 1
Scenario 1

This *senerio* allows you to use the GUI version of Thinstall
occasionally to add/remove files and change settings while the
command-line version can be integrated into your regular build script
process.
This scenario allows you to use the GUI version of Thinstall
occasionally to add/remove files and change settings while the
command-line version can be integrated into your regular build script
process.

*Senerio* 2
Scenario 2

This *senerio* might apply if the project you want to build is very
simple, does not need to add extra options such as the installer, or
change file properties.
This scenario might apply if the project you want to build is very
simple, does not need to add extra options such as the installer, or
change file properties.

http://thinstall.com/help/designedforwindowsxp.htm
If your *applicaiton* contains 2 sets of DLLs, one for Windows
95/98/ME based kernels and another set for NT based kernels - you
should ensure that this will not cause your application to fail if the
*operating* system suddenly changes.
If your application contains 2 sets of DLLs, one for Windows 95/98/ME
based kernels and another set for NT based kernels - you should ensure
that this will not cause your application to fail if the operating
system suddenly changes.

http://thinstall.com/help/stoppingdebuggerattachments.htm
This option causes your program to run with a parent process which
starts *the a* second process as the debug client.
This option causes your program to run with a parent process which
starts the second process as the debug client.

http://thinstall.com/help/contractconsultingservices.htm
In the future you can easily *add / remove* files as you need.
In the future you can easily add/remove files as you need.

We also check to make sure *you* application installs and runs
properly on all versions of 32bit Windows.
We also check to make sure your application installs and runs properly
on all versions of 32bit Windows.

Pricing is *based flat fee* with a small portion due up front, and the
remainder due on completion.
Pricing is flat-fee based with a small portion due up front, and the
remainder due on completion.

http://thinstall.com/help/virtualdirectories.htm
This indicates where the directory will appear to *exists* when the
application is running.
This indicates where the directory will appear to exist when the
application is running.

Depending on the read-order selected, the directories properties may
come from the hard drive rather than the virtual directory when both
*exists* at the same place.
Depending on the read-order selected, the directories properties may
come from the hard drive rather than the virtual directory when both
exist at the same place.

Virtual files may *exists* at a path without the need for a virtual
directory.
Virtual files may exist at a path without the need for a virtual
directory.

http://thinstall.com/help/readorder.htm
In some *case* the ability to replace internally bundled DLL may be
desirable.
In some cases the ability to replace internally bundled DLL may be
desirable.

http://thinstall.com/help/whatarevirtualdirectories.htm
Thinstall implements Virtual Directories which makes the directory
appear to *exists* to the application, even though it may or may not
*exists* on the real filesystem.
Thinstall implements Virtual Directories which makes the directory
appear to exist to the application, even though it may or may not
exist on the real filesystem.

Change the current working directory to a virtual path (path may not
*exists* on the real filesystem)
Change the current working directory to a virtual path (path may not
exist on the real filesystem).

http://thinstall.com/help/runtimeresourceussage.htm
CPU *ussage*
CPU usage

In the case where a multi-threaded program is utilizing the full use
of a CPU while streaming large blocks of data in a second thread,
there is a *posilbility* of a negative performance impact due to
increased CPU spent decompressing data.
In the case where a multi-threaded program is utilizing the full use
of a CPU while streaming large blocks of data in a second thread,
there is a possibility of a negative performance impact due to
increased CPU spent decompressing data.

Memory *ussage*
Memory usage

File handles to opened *to* files outside of the Thinstall package
archive do not have any additional memory allocation.
File handles to opened files outside of the Thinstall package archive
do not have any additional memory allocation.

Hard disk reading *ussage* impact
Hard disk reading usage impact

Hard disk seeking *ussage* impact
Hard disk seeking usage impact

Because compressed data is more likely to be located in the same disk
sector as uncompressed data, a program will typically *causes* fewer
disk seeks than previously.
Because compressed data is more likely to be located in the same disk
sector as uncompressed data, a program will typically cause fewer disk
seeks than previously.

http://thinstall.com/help/installoptions.htm
Controls *weither* Thinstall will display a "Install complete"
message, and ask the user if they wish to run the installed
application.
Controls whether or not Thinstall will display a "Install complete"
message, and ask the user if they wish to run the installed
application.

http://thinstall.com/help/userdirectoryselection.htm
If the user is allowed to select the *installaton* path, Thinstall
uses the Windows standard directory selection dialog provided through
SHBrowseForFolder.
If the user is allowed to select the installation path, Thinstall uses
the Windows standard directory selection dialog provided through
SHBrowseForFolder.

To force *the a* subdirectory appended to the user's selected path
To force a subdirectory appended to the user's selected path

http://thinstall.com/help/shortcuts.htm
This is the command that executed when the shortcut is *exectued* by
the user.
This is the command that executed when the shortcut is executed by the
user.

http://thinstall.com/help/shortcutssecuritypermissio.htm
The software package is then installed *locallly* and the following
macros are automatically replaced by Thinstall.
The software package is then installed locally and the following
macros are automatically replaced by Thinstall.

http://thinstall.com/help/_netsupport.htm
Thinstall provides many additional *benifits* for .NET Programs:
Thinstall provides many additional benefits for .NET Programs:

*Compatabile* with all versions of the .NET Framework (1.0, 1.1, and
future releases)
Compatible with all versions of the .NET Framework (1.0, 1.1, and
future releases)

Incomplete sentence.
Now, when you build an EXE using

http://thinstall.com/help/frequentlyaskedquestions(fa.htm
Click here ** a discussion on this topic.
Click here for a discussion on this topic.

*Version* for other platforms would require a 100% rewrite and a large
amount of new research.
Versions for other platforms would require a 100% rewrite and a large
amount of new research.

No hyperlink on email address.>

<Hope this helps.>

Request for Answer Clarification by jonathanclark-ga on 18 Jul 2003 09:32 PDT
Excellent, thanks!  I will work through the corrections to make sure I
understand them all and then rate your answer tomorrow.

Clarification of Answer by belindalevez-ga on 21 Jul 2003 00:14 PDT
Thankyou.
jonathanclark-ga rated this answer:5 out of 5 stars and gave an additional tip of: $5.00
Great, thanks for the corrections!  Your suggestions were very easy to follow.

Comments  
There are no comments at this time.

Important Disclaimer: Answers and comments provided on Google Answers are general information, and are not intended to substitute for informed professional medical, psychiatric, psychological, tax, legal, investment, accounting, or other professional advice. Google does not endorse, and expressly disclaims liability for any product, manufacturer, distributor, service or service provider mentioned or any opinion expressed in answers or comments. Please read carefully the Google Answers Terms of Service.

If you feel that you have found inappropriate content, please let us know by emailing us at answers-support@google.com with the question ID listed above. Thank you.
Search Google Answers for
Google Answers  


Google Home - Answers FAQ - Terms of Service - Privacy Policy