In article e16564d8-6e3e-4973-be9c-1e2c81fce...@h34g2000yqm.googlegroups.com,
Cooch kochkin.dmi...@gmail.com wrote:
I want to implement such specific feature:
I have a server written in Python. I have a client written in C++. I
want to use Python as network protocol between them. I mean: client
Hi, guys!
I want to implement such specific feature:
I have a server written in Python. I have a client written in C++. I
want to use Python as network protocol between them. I mean: client
send to server such string: a = MyObject(), so object of this type
will appear in server. Any ideas how
Cooch schrieb:
Hi, guys!
I want to implement such specific feature:
I have a server written in Python. I have a client written in C++. I
want to use Python as network protocol between them. I mean: client
send to server such string: a = MyObject(), so object of this type
will appear in server
I want to implement such specific feature:
I have a server written in Python. I have a client written in C++. I
want to use Python as network protocol between them. I mean: client
send to server such string: a = MyObject(), so object of this type
will appear in server. Any ideas how
On Tue, Nov 10, 2009 at 16:31, Daniel Fetchinson
fetchin...@googlemail.com wrote:
This is a *really* bad idea.
How do you know for sure? Maybe the OP wants to use this thing with 3
known researchers working on a cluster that is not even visible to the
outside world. In such a setup the model
On Tue, 10 Nov 2009 16:31:13 +0100, Daniel Fetchinson wrote about using
exec:
This is a *really* bad idea.
How do you know for sure? Maybe the OP wants to use this thing with 3
known researchers working on a cluster that is not even visible to the
outside world. In such a setup the model
On 2009-11-10, Steven D'Aprano st...@remove-this-cybersource.com.au wrote:
On Tue, 10 Nov 2009 16:31:13 +0100, Daniel Fetchinson wrote about using
exec:
This is a *really* bad idea.
How do you know for sure? Maybe the OP wants to use this thing
with 3 known researchers working on a
Daniel Fetchinson schrieb:
I want to implement such specific feature:
I have a server written in Python. I have a client written in C++. I
want to use Python as network protocol between them. I mean: client
send to server such string: a = MyObject(), so object of this type
will appear in server
On Tue, Nov 10, 2009 at 10:56 AM, Steven D'Aprano
st...@remove-this-cybersource.com.au wrote:
On Tue, 10 Nov 2009 16:31:13 +0100, Daniel Fetchinson wrote about using
exec:
This is a *really* bad idea.
How do you know for sure? Maybe the OP wants to use this thing with 3
known researchers
This is a *really* bad idea.
How do you know for sure? Maybe the OP wants to use this thing with 3
known researchers working on a cluster that is not even visible to the
outside world. In such a setup the model the OP suggested is a
perfectly reasonable one. I say this because I often work
This is a *really* bad idea.
How do you know for sure? Maybe the OP wants to use this thing with 3
known researchers working on a cluster that is not even visible to the
outside world. In such a setup the model the OP suggested is a perfectly
reasonable one. I say this because I often work
On Tue, 10 Nov 2009 12:28:49 -0500, geremy condra wrote:
Steven, remember a few weeks ago when you tried to explain to me that
the person who was storing windows administrative passwords using a 40
byte xor cipher with the hardcoded password might not be doing something
stupid because I
My point is that hacking can still be a fun and easy-going activity
when one writes code for himself (almost) without regards to security
and nasty things like that creeping in from the outside. I'm the king
in my castle, although I'm fully aware of the fact that my castle
might be ugly from the
Grant Edwards wrote:
On 2009-11-10, Steven D'Aprano st...@remove-this-cybersource.com.au wrote:
How do you know for sure? Maybe the OP wants to use this thing
with 3 known researchers working on a cluster that is not even
visible to the outside world.
And those three researchers are perfect?
My point is that hacking can still be a fun and easy-going activity
when one writes code for himself (almost) without regards to security
and nasty things like that creeping in from the outside. I'm the king
in my castle, although I'm fully aware of the fact that my castle
might be ugly from
Daniel Fetchinson wrote:
I'm the king in my castle, although I'm fully aware of the fact that my castle
might be ugly from the outside :)
+1 QOTW
--
http://mail.python.org/mailman/listinfo/python-list
Steven D'Aprano wrote:
I can only repeat what I said to Daniel: can you guarantee that the nice
safe, low-risk environment will never change? If not, then choose a more
realistic threat model, and build the walls of your locked box
accordingly.
Seems to me you can't really *guarentee*
On Tue, Nov 10, 2009 at 2:08 PM, Steven D'Aprano
st...@remove-this-cybersource.com.au wrote:
On Tue, 10 Nov 2009 12:28:49 -0500, geremy condra wrote:
Steven, remember a few weeks ago when you tried to explain to me that
the person who was storing windows administrative passwords using a 40
18 matches
Mail list logo