You're not missing anything except it raises the bar.  Anybody can get
around refox code while you have to look for somebody to get around MoleBox.
So there you go: anybody vs. somebody - big choice.  

Regards,
 
Scott Ramey
BDS Software

> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf
> Of Ed Leafe
> Sent: Tuesday, April 10, 2007 11:59 AM
> To: ProFox Email List
> Subject: Re: [NF] Dabo Issue (was RE:
> [NF]Iguessit'stimeforanotherprogramminglanguage...)
> 
> On Apr 10, 2007, at 2:19 PM, Scott Ramey wrote:
> 
> > Try www.molebox.com, works great with VFP, may work with Python.
> 
>       I always wondered how things like this could not be easily hacked by
> someone with similar code experience as the authors. During the time
> that the encrypted file is being run, it has to be decrypted back to
> the original byte code in order to be properly interpreted, and there
> are ways to dump the memory of a process in order to re-create the
> original byte codes. At that point, it's no more difficult than it is
> to re-create source from a .pyc or a .fxp file. Or am I missing an
> important step somewhere?
> 
> -- Ed Leafe
> -- http://leafe.com
> -- http://dabodev.com
> 
> 
> 
> 
[excessive quoting removed by server]

_______________________________________________
Post Messages to: ProFox@leafe.com
Subscription Maintenance: http://leafe.com/mailman/listinfo/profox
OT-free version of this list: http://leafe.com/mailman/listinfo/profoxtech
Searchable Archive: http://leafe.com/archives/search/profox
This message: http://leafe.com/archives/byMID/profox/[EMAIL PROTECTED]
** All postings, unless explicitly stated otherwise, are the opinions of the 
author, and do not constitute legal or medical advice. This statement is added 
to the messages for those lawyers who are too stupid to see the obvious.

Reply via email to