On Apr 10, 2007, at 2:19 PM, Scott Ramey wrote:
> Try www.molebox.com, works great with VFP, may work with Python.
I always wondered how things like this could not be easily hacked by
someone with similar code experience as the authors. During the time
that the encrypted file is being run, it has to be decrypted back to
the original byte code in order to be properly interpreted, and there
are ways to dump the memory of a process in order to re-create the
original byte codes. At that point, it's no more difficult than it is
to re-create source from a .pyc or a .fxp file. Or am I missing an
important step somewhere?
-- Ed Leafe
-- http://leafe.com
-- http://dabodev.com
_______________________________________________
Post Messages to: [email protected]
Subscription Maintenance: http://leafe.com/mailman/listinfo/profox
OT-free version of this list: http://leafe.com/mailman/listinfo/profoxtech
Searchable Archive: http://leafe.com/archives/search/profox
This message: http://leafe.com/archives/byMID/profox/[EMAIL PROTECTED]
** All postings, unless explicitly stated otherwise, are the opinions of the
author, and do not constitute legal or medical advice. This statement is added
to the messages for those lawyers who are too stupid to see the obvious.