Jeff- 
    That worked fairly well. I set up the whole thing in the registry 
(win98) 
(hkeylocalmachine\software\microsoft\windows\currentversion\run) with the 
'-qw' switch
and it did just fine. I set it to check "myip: read join dns:// read dns://" 
every ten minutes 
and if it is not 127.0.0.1 or if it has changed since last check, 
I post it to a private web page.

    The only problem is that the box does not grab global focus.
That is, the box sits behind the browser and you don't see it unless
you look at the taskbar. (Remember we're talking about kids who do 
not want to see this box). This is minor and it took care of the 
main problem: My curiosity :-}

    This little exercise brings up some questions. 
1. How does Carl feel about this?
2. REBOL advertises itself as a messaging language. Is this not messaging at 
its finest? :-)
3. Is this something that REBOL/view will address?

-Ridley


>
>      Sure: You fire up the windows version of REBOL and: 
>
>      write/binary %hacked-rebol.exe head change 
>          find read/binary %rebol.exe 
>              "Script requests permission to" 
>              "Hey kids! Get off the phone!!"
> 
>  (There's more text on the message that you can change, if
>  you want to add expletives and stuff.. but of course, be
>  sure to only overwrite the text that's there.  Don't change
>  the length of the text.)
>
>  Then you start up your hacked version of REBOL, (W/O
>  modifying the default security) and you run this following:
> 
>
>  REBOL [] wait reduce [open tcp://:9911] secure none
>
>
>  Then, when you send something to port 9911, the message box
>  with your message will pop up. 
>
>  What a hack... :-)
>
>  Of course, this letter in no way implies that REBOL
>  Technologies encourages people to arbitrarily hack REBOL!
>
>  Be kind to the old rebol binary...
>
>   -jeff

Reply via email to