On Apr 10, 2007, at 2:19 PM, Scott Ramey wrote: > Try www.molebox.com, works great with VFP, may work with Python.
I always wondered how things like this could not be easily hacked by someone with similar code experience as the authors. During the time that the encrypted file is being run, it has to be decrypted back to the original byte code in order to be properly interpreted, and there are ways to dump the memory of a process in order to re-create the original byte codes. At that point, it's no more difficult than it is to re-create source from a .pyc or a .fxp file. Or am I missing an important step somewhere? -- Ed Leafe -- http://leafe.com -- http://dabodev.com _______________________________________________ Post Messages to: ProFox@leafe.com Subscription Maintenance: http://leafe.com/mailman/listinfo/profox OT-free version of this list: http://leafe.com/mailman/listinfo/profoxtech Searchable Archive: http://leafe.com/archives/search/profox This message: http://leafe.com/archives/byMID/profox/[EMAIL PROTECTED] ** All postings, unless explicitly stated otherwise, are the opinions of the author, and do not constitute legal or medical advice. This statement is added to the messages for those lawyers who are too stupid to see the obvious.