Re: [AD] [U2] Basic developments reverse engineering tool ?

2007-06-29 Thread Brian Leach
That's very difficult to trap.

Mark

It's a valid point and a common scenario.

I've taken two approaches in the past:

1. Dynamic analysis

This replaces certain constructs in the source code automatically with calls to 
subroutines or external functions that update the maps in real time. So for 
example every OPEN can be replaced with subroutine that writes the name of the 
program and the file opened to the audit files. However this is only under very 
controlled conditions, and never guaranteed to be complete - a particular file 
might only be opened as part of a year-end procedure for example and so the 
'correctness' of dynamic analysis depends on the code coverage.

2. Manual Labour

To accept that static analysis is always incomplete, but provide a way to 
identify where the incompleteness occurs (e.g. to log wherever there is an OPEN 
with a file name that cannot be determined) and provide a way for that link to 
be documented and completed manually so that eventually the map becomes as 
complete as possible.

It's the down side of having such a flexible platform, that it can make any 
form of automated auditing and analysis far more difficult.

Brian

How does it work with parameter driven code.

One of my clients has procs like this:

HRUN BP SOP1500
STON
HORDER
HCUSTOMER
HPRODUCT
HVENDOR
P

whereby the program (BP SOP1500) has the corresponding INPUT statements for
the file names and opens them as F1, F2, F3 which is a real bear when
reading the code. Plus all of the bottom line field prompts are also
tableized. Very klugy and not friendly at all.

I tend to copy the program in question to another place and do a global
replace of the R/F1/ORDER just to see the flow.

Thanks
Mark Johnson
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/


Re: [AD] [U2] Basic developments reverse engineering tool ?

2007-06-29 Thread Timothy Snyder
 One of my clients has procs like this:
 
 HRUN BP SOP1500
 STON
 HORDER
 HCUSTOMER
 HPRODUCT
 HVENDOR
 P
 
 whereby the program (BP SOP1500) has the corresponding INPUT statements 
for
 the file names and opens them as F1, F2, F3 which is a real bear when
 reading the code.

Wow - that's just plan mean!  There may have been a thought that it was a 
way to avoid hard-coding file names in case they ever changed (though that 
would be a weak argument), but then they're hard-coded in the PROC, so I 
can't see any benefit at all, other than obfuscation.  The person that 
created it must have had a future grudge against whoever came along to 
maintain the code.  Take my job from me, did you?  I'll teach you a 
lesson.  :-)

Tim Snyder
Consulting I/T Specialist
U2 Lab Services
Information Management, IBM Software Group
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/


RE: [AD] [U2] Basic developments reverse engineering tool ?

2007-06-29 Thread Norman Morgan
When in doubt, obfuscate.

===
Norman Morgan  [EMAIL PROTECTED]  http://www.brake.com
===
Judge: An unemployed lawyer who wears a black dress.
===
 

 -Original Message-
 From: [EMAIL PROTECTED] 
 [mailto:[EMAIL PROTECTED] On Behalf Of 
 Timothy Snyder
 Sent: Friday, June 29, 2007 8:21 AM
 To: u2-users@listserver.u2ug.org
 Subject: Re: [AD] [U2] Basic developments reverse engineering tool ?
 
  One of my clients has procs like this:
  
  HRUN BP SOP1500
  STON
  HORDER
  HCUSTOMER
  HPRODUCT
  HVENDOR
  P
  
  whereby the program (BP SOP1500) has the corresponding INPUT 
  statements
 for
  the file names and opens them as F1, F2, F3 which is a real 
 bear when 
  reading the code.
 
 Wow - that's just plan mean!  There may have been a thought 
 that it was a way to avoid hard-coding file names in case 
 they ever changed (though that would be a weak argument), but 
 then they're hard-coded in the PROC, so I can't see any 
 benefit at all, other than obfuscation.  The person that 
 created it must have had a future grudge against whoever came 
 along to maintain the code.  Take my job from me, did you?  
 I'll teach you a lesson.  :-)
 
 Tim Snyder
 Consulting I/T Specialist
 U2 Lab Services
 Information Management, IBM Software Group
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/


RE: [AD] [U2] Basic developments reverse engineering tool ?

2007-06-29 Thread Norman Morgan
Joking aside, that looks almost like something written by someone who
was accustomed to writing mainframe COBOL where actual file assignments
were made outside the program code in JCL.  That doesn't excuse the
internal naming style, but the technique harks back to my misspent
youth as a COBOL programmer.

  -Original Message-
  From: [EMAIL PROTECTED]
  [mailto:[EMAIL PROTECTED] On Behalf Of Timothy 
  Snyder
  Sent: Friday, June 29, 2007 8:21 AM
  To: u2-users@listserver.u2ug.org
  Subject: Re: [AD] [U2] Basic developments reverse 
 engineering tool ?
  
   One of my clients has procs like this:
   
   HRUN BP SOP1500
   STON
   HORDER
   HCUSTOMER
   HPRODUCT
   HVENDOR
   P
   
   whereby the program (BP SOP1500) has the corresponding INPUT 
   statements
  for
   the file names and opens them as F1, F2, F3 which is a real
  bear when
   reading the code.
  
  Wow - that's just plan mean!  There may have been a thought that it 
  was a way to avoid hard-coding file names in case they ever changed 
  (though that would be a weak argument), but then they're 
 hard-coded in 
  the PROC, so I can't see any benefit at all, other than 
 obfuscation.  
  The person that created it must have had a future grudge against 
  whoever came along to maintain the code.  Take my job from me, did 
  you?
  I'll teach you a lesson.  :-)
  
  Tim Snyder
  Consulting I/T Specialist
  U2 Lab Services
  Information Management, IBM Software Group
 ---
 u2-users mailing list
 u2-users@listserver.u2ug.org
 To unsubscribe please visit http://listserver.u2ug.org/
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/


RE: [AD] [U2] Basic developments reverse engineering tool ?

2007-06-29 Thread Stevenson, Charles
If I recall correctly, SoftWhere handled that sort of thing.
I do remember seeing it pick up subroutine's uses of files where the
file variable was passed as an argument from the calling program.

-Original Message-
How does it work with parameter driven code.

One of my clients has procs like this:

HRUN BP SOP1500
STON
HORDER
HCUSTOMER
HPRODUCT
HVENDOR
P

whereby the program (BP SOP1500) has the corresponding INPUT statements
for the file names and opens them as F1, F2, F3
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/


RE: [AD] [U2] Basic developments reverse engineering tool ?

2007-06-29 Thread bpaige
Just to play devil's advocate, there ARE good reasons for doing the code that
way:

1.  The same program can be used for processing live and historical data if
they're in different files.  Just create two procs and pass live files in one
and historical files in the other.
2.  The same program can be used for other file sets - assuming it's a
generic routine.
3.  Filenames can be changed without having to recompile the program.
Although it's a little safer in U2, recompiling code out from under a user
isn't a good thing in most flavors of Pick - unless you enjoy sending them to
a RIF error.

Again, I'm not saying there aren't better ways to do it, but there are legit
reasons for this type of code - and who knows how long ago the code was
written too.

My 1.5

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Norman Morgan
Sent: Friday, June 29, 2007 9:02 AM
To: u2-users@listserver.u2ug.org
Subject: RE: [AD] [U2] Basic developments reverse engineering tool ?

Joking aside, that looks almost like something written by someone who
was accustomed to writing mainframe COBOL where actual file assignments
were made outside the program code in JCL.  That doesn't excuse the
internal naming style, but the technique harks back to my misspent
youth as a COBOL programmer.

  -Original Message-
  From: [EMAIL PROTECTED]
  [mailto:[EMAIL PROTECTED] On Behalf Of Timothy 
  Snyder
  Sent: Friday, June 29, 2007 8:21 AM
  To: u2-users@listserver.u2ug.org
  Subject: Re: [AD] [U2] Basic developments reverse 
 engineering tool ?
  
   One of my clients has procs like this:
   
   HRUN BP SOP1500
   STON
   HORDER
   HCUSTOMER
   HPRODUCT
   HVENDOR
   P
   
   whereby the program (BP SOP1500) has the corresponding INPUT 
   statements
  for
   the file names and opens them as F1, F2, F3 which is a real
  bear when
   reading the code.
  
  Wow - that's just plan mean!  There may have been a thought that it 
  was a way to avoid hard-coding file names in case they ever changed 
  (though that would be a weak argument), but then they're 
 hard-coded in 
  the PROC, so I can't see any benefit at all, other than 
 obfuscation.  
  The person that created it must have had a future grudge against 
  whoever came along to maintain the code.  Take my job from me, did 
  you?
  I'll teach you a lesson.  :-)
  
  Tim Snyder
  Consulting I/T Specialist
  U2 Lab Services
  Information Management, IBM Software Group
 ---
 u2-users mailing list
 u2-users@listserver.u2ug.org
 To unsubscribe please visit http://listserver.u2ug.org/
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/

_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 
_ _ _ _ _ _ _ _ _ _

The information transmitted is intended only for the person or entity to which 
it is addressed and may contain confidential and/or privileged material not 
intended for Public use.  
Any review, retransmission, dissemination or other use of, or taking of any 
action in reliance upon, this information by persons or entities other than the 
intended recipient is 
strictly prohibited. If you received this communication in error, please notify 
the sender and delete the material from any and all computers or devices.
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/


RE: [AD] [U2] Basic developments reverse engineering tool ?

2007-06-29 Thread IT-Laure Hansen
I have been trying to track Joe Toledo and/or someone at his company
Toledo Inc. (who used to distribute SoftWhere) but all e-mails have come
back undeliverable. The company's web site is also down.

That's just too bad.

Laure Hansen,
City of Redwood City
Information Technology
1017 Middlefield Road
Redwood City, CA 94063
Tel 650-780-7087
Fax 650-556-9204
[EMAIL PROTECTED]

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Stevenson,
Charles
Sent: Friday, June 29, 2007 7:28 AM
To: u2-users@listserver.u2ug.org
Subject: RE: [AD] [U2] Basic developments reverse engineering tool ?

If I recall correctly, SoftWhere handled that sort of thing.
I do remember seeing it pick up subroutine's uses of files where the
file variable was passed as an argument from the calling program.

-Original Message-
How does it work with parameter driven code.

One of my clients has procs like this:

HRUN BP SOP1500
STON
HORDER
HCUSTOMER
HPRODUCT
HVENDOR
P

whereby the program (BP SOP1500) has the corresponding INPUT statements
for the file names and opens them as F1, F2, F3
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/


Re: [AD] [U2] Basic developments reverse engineering tool ?

2007-06-29 Thread MAJ Programming
The designers of this mess were (are) called Gull from Long Island, NY. It
appears to be one of the many early attempts at a 4GL that are now Roadkill.

I have another client running similar code for a Credit  Collections
application called BestCollect.

I could write a book on the false starts of programming in MV.

My 1 cent
Mark Johnson

P.S. In response to the 'future grudges' that could occur, and the history
of MV programmers, VARs etc, I would definitely insist that If I were to
purchase an application from a VAR and the source code were not on my
system, that the source code be stored in escrow by a 3rd party. That way,
when the software VAR eventually goes out of business, at least the source
sode is available.

I don't mind following awkward source code. But I do have to have it.
- Original Message -
From: Timothy Snyder [EMAIL PROTECTED]
To: u2-users@listserver.u2ug.org
Sent: Friday, June 29, 2007 9:20 AM
Subject: Re: [AD] [U2] Basic developments reverse engineering tool ?


  One of my clients has procs like this:
 
  HRUN BP SOP1500
  STON
  HORDER
  HCUSTOMER
  HPRODUCT
  HVENDOR
  P
 
  whereby the program (BP SOP1500) has the corresponding INPUT statements
 for
  the file names and opens them as F1, F2, F3 which is a real bear when
  reading the code.

 Wow - that's just plan mean!  There may have been a thought that it was a
 way to avoid hard-coding file names in case they ever changed (though that
 would be a weak argument), but then they're hard-coded in the PROC, so I
 can't see any benefit at all, other than obfuscation.  The person that
 created it must have had a future grudge against whoever came along to
 maintain the code.  Take my job from me, did you?  I'll teach you a
 lesson.  :-)

 Tim Snyder
 Consulting I/T Specialist
 U2 Lab Services
 Information Management, IBM Software Group
 ---
 u2-users mailing list
 u2-users@listserver.u2ug.org
 To unsubscribe please visit http://listserver.u2ug.org/
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/


Re: [AD] [U2] Basic developments reverse engineering tool ?

2007-06-29 Thread MAJ Programming
While your examples are not false, they're hardly true either. In my many
years of MV programming, I've never seen such alternate files or other
methods. The closest I've seen is code within the program to decide which
files to use.

I think you are implying contemporary intelligence against an old technique.

This entire application is written this way so the chances of having
EVERYTHING have alternate files is pretty slim.

Thanks
Mark Johnson
- Original Message -
From: [EMAIL PROTECTED]
To: u2-users@listserver.u2ug.org
Sent: Friday, June 29, 2007 11:08 AM
Subject: RE: [AD] [U2] Basic developments reverse engineering tool ?


 Just to play devil's advocate, there ARE good reasons for doing the code
that
 way:

 1.  The same program can be used for processing live and historical data
if
 they're in different files.  Just create two procs and pass live files in
one
 and historical files in the other.
 2.  The same program can be used for other file sets - assuming it's a
 generic routine.
 3.  Filenames can be changed without having to recompile the program.
 Although it's a little safer in U2, recompiling code out from under a user
 isn't a good thing in most flavors of Pick - unless you enjoy sending them
to
 a RIF error.

 Again, I'm not saying there aren't better ways to do it, but there are
legit
 reasons for this type of code - and who knows how long ago the code was
 written too.

 My 1.5

 -Original Message-
 From: [EMAIL PROTECTED]
 [mailto:[EMAIL PROTECTED] On Behalf Of Norman Morgan
 Sent: Friday, June 29, 2007 9:02 AM
 To: u2-users@listserver.u2ug.org
 Subject: RE: [AD] [U2] Basic developments reverse engineering tool ?

 Joking aside, that looks almost like something written by someone who
 was accustomed to writing mainframe COBOL where actual file assignments
 were made outside the program code in JCL.  That doesn't excuse the
 internal naming style, but the technique harks back to my misspent
 youth as a COBOL programmer.

   -Original Message-
   From: [EMAIL PROTECTED]
   [mailto:[EMAIL PROTECTED] On Behalf Of Timothy
   Snyder
   Sent: Friday, June 29, 2007 8:21 AM
   To: u2-users@listserver.u2ug.org
   Subject: Re: [AD] [U2] Basic developments reverse
  engineering tool ?
  
One of my clients has procs like this:
   
HRUN BP SOP1500
STON
HORDER
HCUSTOMER
HPRODUCT
HVENDOR
P
   
whereby the program (BP SOP1500) has the corresponding INPUT
statements
   for
the file names and opens them as F1, F2, F3 which is a real
   bear when
reading the code.
  
   Wow - that's just plan mean!  There may have been a thought that it
   was a way to avoid hard-coding file names in case they ever changed
   (though that would be a weak argument), but then they're
  hard-coded in
   the PROC, so I can't see any benefit at all, other than
  obfuscation.
   The person that created it must have had a future grudge against
   whoever came along to maintain the code.  Take my job from me, did
   you?
   I'll teach you a lesson.  :-)
  
   Tim Snyder
   Consulting I/T Specialist
   U2 Lab Services
   Information Management, IBM Software Group
  ---
  u2-users mailing list
  u2-users@listserver.u2ug.org
  To unsubscribe please visit http://listserver.u2ug.org/
 ---
 u2-users mailing list
 u2-users@listserver.u2ug.org
 To unsubscribe please visit http://listserver.u2ug.org/

 _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _

 The information transmitted is intended only for the person or entity to
which it is addressed and may contain confidential and/or privileged
material not intended for Public use.
 Any review, retransmission, dissemination or other use of, or taking of
any action in reliance upon, this information by persons or entities other
than the intended recipient is
 strictly prohibited. If you received this communication in error, please
notify the sender and delete the material from any and all computers or
devices.
 ---
 u2-users mailing list
 u2-users@listserver.u2ug.org
 To unsubscribe please visit http://listserver.u2ug.org/
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/


Re: [AD] [U2] Basic developments reverse engineering tool ?

2007-06-29 Thread Susan Lynch

Will,
Having spent a lot of my career consulting, I have seen a system where the 
history was archived in files named with the year eg INVOICES was the 
current fiscal year, INVOICES2006 was last year's orders, INVOICES2005 were 
2 fiscal years back, etc.  The same held true for the sales history files. 
There were programs which were passed the file names, which were opened to 
INV.FILE, SALES.HIST, etc and the same logic ran on the history files as on 
the current fiscal year's files.  This was many years back, when disk space 
was more expensive, and history files were archived to removeable media 
(bulky tapes, usually) and brought back when needed for history reports. 
The proc for the current year would pass hard-coded file names, while the 
proc for prior years would prompt for the year and append it to the file 
names and pass those.  But it was not the entire system - probably the one 
you inherited was written by someone who learned on such a system and 
thought it was the only way to write code (or a cool way to write code) and 
who never gave a moment's thought to maintainability or documentation.


Susan Lynch
F. W. Davison  Company, Inc.
- Original Message - 
From: MAJ Programming [EMAIL PROTECTED]

To: u2-users@listserver.u2ug.org
Sent: Friday, June 29, 2007 7:38 PM
Subject: Re: [AD] [U2] Basic developments reverse engineering tool ?



While your examples are not false, they're hardly true either. In my many
years of MV programming, I've never seen such alternate files or other
methods. The closest I've seen is code within the program to decide which
files to use.

I think you are implying contemporary intelligence against an old 
technique.


This entire application is written this way so the chances of having
EVERYTHING have alternate files is pretty slim.

Thanks
Mark Johnson
- Original Message -
From: [EMAIL PROTECTED]
To: u2-users@listserver.u2ug.org
Sent: Friday, June 29, 2007 11:08 AM
Subject: RE: [AD] [U2] Basic developments reverse engineering tool ?



Just to play devil's advocate, there ARE good reasons for doing the code

that

way:

1.  The same program can be used for processing live and historical data

if

they're in different files.  Just create two procs and pass live files in

one

and historical files in the other.
2.  The same program can be used for other file sets - assuming it's a
generic routine.
3.  Filenames can be changed without having to recompile the program.
Although it's a little safer in U2, recompiling code out from under a 
user
isn't a good thing in most flavors of Pick - unless you enjoy sending 
them

to

a RIF error.

Again, I'm not saying there aren't better ways to do it, but there are

legit

reasons for this type of code - and who knows how long ago the code was
written too.

My 1.5

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Norman Morgan
Sent: Friday, June 29, 2007 9:02 AM
To: u2-users@listserver.u2ug.org
Subject: RE: [AD] [U2] Basic developments reverse engineering tool ?

Joking aside, that looks almost like something written by someone who
was accustomed to writing mainframe COBOL where actual file assignments
were made outside the program code in JCL.  That doesn't excuse the
internal naming style, but the technique harks back to my misspent
youth as a COBOL programmer.

  -Original Message-
  From: [EMAIL PROTECTED]
  [mailto:[EMAIL PROTECTED] On Behalf Of Timothy
  Snyder
  Sent: Friday, June 29, 2007 8:21 AM
  To: u2-users@listserver.u2ug.org
  Subject: Re: [AD] [U2] Basic developments reverse
 engineering tool ?
 
   One of my clients has procs like this:
  
   HRUN BP SOP1500
   STON
   HORDER
   HCUSTOMER
   HPRODUCT
   HVENDOR
   P
  
   whereby the program (BP SOP1500) has the corresponding INPUT
   statements
  for
   the file names and opens them as F1, F2, F3 which is a real
  bear when
   reading the code.
 
  Wow - that's just plan mean!  There may have been a thought that it
  was a way to avoid hard-coding file names in case they ever changed
  (though that would be a weak argument), but then they're
 hard-coded in
  the PROC, so I can't see any benefit at all, other than
 obfuscation.
  The person that created it must have had a future grudge against
  whoever came along to maintain the code.  Take my job from me, did
  you?
  I'll teach you a lesson.  :-)
 
  Tim Snyder
  Consulting I/T Specialist
  U2 Lab Services
  Information Management, IBM Software Group
 ---
 u2-users mailing list
 u2-users@listserver.u2ug.org
 To unsubscribe please visit http://listserver.u2ug.org/
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/

_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ 
_

_ _ _ _ _ _ _ _ _ _ _ _ _ _ _


The information transmitted is intended only for the person or entity to

which

Re: [AD] [U2] Basic developments reverse engineering tool ?

2007-06-28 Thread MAJ Programming
How does it work with parameter driven code.

One of my clients has procs like this:

HRUN BP SOP1500
STON
HORDER
HCUSTOMER
HPRODUCT
HVENDOR
P

whereby the program (BP SOP1500) has the corresponding INPUT statements for
the file names and opens them as F1, F2, F3 which is a real bear when
reading the code. Plus all of the bottom line field prompts are also
tableized. Very klugy and not friendly at all.

I tend to copy the program in question to another place and do a global
replace of the R/F1/ORDER just to see the flow.

Thanks
Mark Johnson
- Original Message -
From: Laura Hirsh [EMAIL PROTECTED]
To: u2-users@listserver.u2ug.org
Sent: Thursday, June 28, 2007 2:26 PM
Subject: [AD] [U2] Basic developments reverse engineering tool ?


 The type of Technical Documentation that Susan mentions is a part of
 DocuSys! Not only does DocuSys comb through basic code, and also the gamut
 of SB+ bits, but it sends it to MS Word - nicely formatted, with a table
of
 contents, pagination, Styles, etc. Options include both User Documentation
 (for SB+ Apps) and Technical Documentation (SB+/Non-SB+).

 This isn't really an ad, but DocuSys a really useful product/tool. If
anyone
 would like more information, let me know!

 Laura Hirsh


 -Original Message-
 From: [EMAIL PROTECTED]
 [mailto:[EMAIL PROTECTED] On Behalf Of Susan Joslyn
 Sent: Thursday, June 28, 2007 7:59 AM
 To: u2-users@listserver.u2ug.org
 Subject: RE: [U2] Basic developments reverse engineering tool ?

 I was thinking of the sort of documentation that you could get from
writing
 a utility to comb through code. I've written some (not for prime time)
 versions of this sort of thing. In particular whenever converting from one
 platform to another.

 The types of technical documentation that one can glean programmatically
 from an application are:

 What files are opened by what programs
 Where are records written
 What fields/amcs are read and written by what programs
 What subroutines are called by what programs
 What includes/inserts are in use, where
 In the case of SB+ (or any system where fields are referenced by name) -
 schemas can be built identifying field name across files and when and
where
 these are updated

 What else?

 One thing that I have built into my application that I use rarely but when
I
 need it I find it extremely handy - every one of my programs calls a
 subroutine at the beginning that just time-date stamps that it has been
run.
 I think I keep the last five or ten runs in a Multivalue list.

 This helps when I want to clean up and find stuff that never gets run - or
 when I want to see the last time a customer ran something.  I tiny little
 subroutine that you can stuff programmatically into a top line of all
 programs and let it go for awhile.  Then come back and find interesting
 things.

 Susan
 
 Date: Wed, 27 Jun 2007 11:33:17 -0700
 From: Tony Gravagno [EMAIL PROTECTED]

 I don't believe there is a way to have a program read code and figure out
 what it does from a logical perspective.  When you say technical
 documentation, I'm not sure what sort of info you wish to extract from
your
 code.  If you mean file usage, common usage, etc, the only way to get a
 program to process such information is to make sure you have your code
 completely consistent - or you need to use meta data as described below.
 ---
 u2-users mailing list
 u2-users@listserver.u2ug.org
 To unsubscribe please visit http://listserver.u2ug.org/
 ---
 u2-users mailing list
 u2-users@listserver.u2ug.org
 To unsubscribe please visit http://listserver.u2ug.org/
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/


RE: [AD] [U2] Basic developments reverse engineering tool ?

2007-06-27 Thread Tom Dodds
We have a series of programs that will dissect a U2 application and create a
series of documentation databases.  We have some canned reports or you can
simply use LIST to generate your own reports.  The application is available
for installation on one of your systems so you can maintain this level of
documentation.
We are working on a second module that will allow for the entry of textual
descriptions for each component and then generate various types of
documentation. IE. html, pdf, csv, rtf, etc

Contact me off line if this sounds interesting.

Tom Dodds 
[EMAIL PROTECTED]
 

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Herve Balestrieri
Sent: Wednesday, June 27, 2007 10:23 AM
To: u2-users@listserver.u2ug.org
Subject: Re: [U2] Basic developments reverse engineering tool ?

To clarify the inquiry : I am seeking for a tool reading Basic source code
modules and producing a technical documentation of an application
automatically.
This is not the purpose of an object code decompiler.

Thanks

Herve' Balestrieri

 There was UN-Basic that took compiled code and reverted it back to source
 code.
 My 1 cent
 Mark Johnson
 - Original Message -
 From: Herve Balestrieri [EMAIL PROTECTED]

  Does it exists a (marketed?) tool for MV databases (i.e UniVerse) that
  would allow
  to make the reverse engineering of an application, based on automated
  Basic source code analysis ?
 
  Thanks for any information.
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/