By the way.... I wouldn't run that code. I just read an article the other day about how hackers will embed code within base64 code, and it ends up extracting an entire programming environment that gives the hacker full access..
Not sure exactly what that code in IUP evals too, but I WOULD NOT trust it. http://www.devside.net/blog/smf-exploit-like-phpbb-hack -Thadeus On Sat, Nov 14, 2009 at 1:06 PM, Álvaro Justen [Turicas] < [email protected]> wrote: > > On Sat, Nov 14, 2009 at 16:32, villas <[email protected]> wrote: > > > > Like Mr Freeze, I can't find "populate" on Google Code. > > Maybe you forgot to add the file? > > > You can found the code at Launchpad (we need to centralize the > development! We need BitBucket! ;-): > > http://bazaar.launchpad.net/~mdipierro/web2py/devel/annotate/head%3A/gluon/contrib/populate.py<http://bazaar.launchpad.net/%7Emdipierro/web2py/devel/annotate/head%3A/gluon/contrib/populate.py> > > Great work, Massimo! It'll be very useful. > > -- > Álvaro Justen > Peta5 - Nós fazemos TV digital > http://www.peta5.com.br/ > 21. 3021-6001 / 9898-0141 > > > > --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "web2py-users" group. To post to this group, send email to [email protected] To unsubscribe from this group, send email to [email protected] For more options, visit this group at http://groups.google.com/group/web2py?hl=en -~----------~----~----~----~------~----~------~--~---

