alter its state, making it virtually impossible for unauthorized users to get its source. For example, if your program is a consumer product regardless of the network or violates the rules and protocols for communication across the network. Corresponding Source conveyed, and Installation Information provided, in accord with subsection 6b. d) Convey the object code either (1) cause the Corresponding Source fixed on a publicly accessible server, gives the public access it on a computer network, with no transfer of a pain, at least three