You're not missing anything except it raises the bar. Anybody can get around refox code while you have to look for somebody to get around MoleBox. So there you go: anybody vs. somebody - big choice.
Regards, Scott Ramey BDS Software > -----Original Message----- > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf > Of Ed Leafe > Sent: Tuesday, April 10, 2007 11:59 AM > To: ProFox Email List > Subject: Re: [NF] Dabo Issue (was RE: > [NF]Iguessit'stimeforanotherprogramminglanguage...) > > On Apr 10, 2007, at 2:19 PM, Scott Ramey wrote: > > > Try www.molebox.com, works great with VFP, may work with Python. > > I always wondered how things like this could not be easily hacked by > someone with similar code experience as the authors. During the time > that the encrypted file is being run, it has to be decrypted back to > the original byte code in order to be properly interpreted, and there > are ways to dump the memory of a process in order to re-create the > original byte codes. At that point, it's no more difficult than it is > to re-create source from a .pyc or a .fxp file. Or am I missing an > important step somewhere? > > -- Ed Leafe > -- http://leafe.com > -- http://dabodev.com > > > > [excessive quoting removed by server] _______________________________________________ Post Messages to: ProFox@leafe.com Subscription Maintenance: http://leafe.com/mailman/listinfo/profox OT-free version of this list: http://leafe.com/mailman/listinfo/profoxtech Searchable Archive: http://leafe.com/archives/search/profox This message: http://leafe.com/archives/byMID/profox/[EMAIL PROTECTED] ** All postings, unless explicitly stated otherwise, are the opinions of the author, and do not constitute legal or medical advice. This statement is added to the messages for those lawyers who are too stupid to see the obvious.