So you (someone) are saying that by exchanging these two files (legal and illegal) would allow us to create new jump holes and jump hole zones into which ever system that targets to which ever system?
Basically lots of us are interested on just "understanding" how the legal and illegal path ini files work, the formula... the first two columns show source and target paths, but some of the routes are the same between three paths (including system)... hmmm... Please enlighten us, oh someone.
Basically lots of us are interested on just "understanding" how the legal and illegal path ini files work, the formula... the first two columns show source and target paths, but some of the routes are the same between three paths (including system)... hmmm... Please enlighten us, oh someone.