World: r3wp
[Core] Discuss core issues
older newer | first last |
Graham 8-Sep-2009 [14714] | My practice is usually make one change and then encap. If I make two changes I'm in trouble. Worse if I make changes while watchingTV :( |
Anton 8-Sep-2009 [14715] | Ahh.. :) the real source of the trouble comes out :) |
Graham 8-Sep-2009 [14716x3] | haha |
First episode of NCIS NY | |
I don't know what other people do to manage code of this size .... | |
Sunanda 8-Sep-2009 [14719] | <What I need is a utility that will take a rebol script, and parse it out by function, attempting to intepret it until it reaches an error.> I think there was one in the Official Guide (the book). |
Graham 8-Sep-2009 [14720] | heh... I never got past the first chapter. After that I used it as a bookend. |
Ashley 10-Sep-2009 [14721x2] | Looking at to-rebol-file and wondering what advantage it has over to file! ... they seem functionally equivalent to me. |
Also, the help text for as-string says "Coerces any type of string ...". Should that read "any type of series"? | |
Graham 10-Sep-2009 [14723x3] | >> to-file "c:\rebol\rebol.exe" == %c:\rebol\rebol.exe >> to-rebol-file "c:\rebol\rebol.exe" == %/c/rebol/rebol.exe |
>> exists? to-file "c:\rebol\rebgui\enfacecmd.exe" == false >> exists? to-rebol-file "c:\rebol\rebgui\enfacecmd.exe" == true | |
Seems to be big functional differences on windows at least. | |
Ashley 10-Sep-2009 [14726] | Mostly around driver letter and slash direction handling. I suppose the question then is, why doesn't to file! do what to-rebol-file does ... I don't see the point in using to-file to create an "invalid" file ... a bit like having both a to-decimal and to-rebol-decimal for example. |
Graham 10-Sep-2009 [14727] | >> to-file "test.exe" == %test.exe >> to-local-file "test.exe" == "test.exe" |
Ashley 10-Sep-2009 [14728] | to-local-file makes sense to me, it's the need for both to-file and to-rebol-file I'm curious about. |
BrianH 10-Sep-2009 [14729] | TO-FILE is only for datatype coersion. It makes sense to have both. |
Ashley 10-Sep-2009 [14730] | Uh? All the to-* datatype conversion functions are implicitly to-rebol-* ... why the need for a to-file that can produce "invalid" rebol file types and to-rebol-file that produces "valid" rebol file types? I'm looking for the reason/case where you would want to use to-file in preference to to-rebol-file. |
BrianH 10-Sep-2009 [14731] | The file! type is just a datatype. There's no guarantee that the file! refers to anything, or is even the right syntax. |
Izkata 10-Sep-2009 [14732] | to-rebol-file and to-local-file are more like a pair, too. The other to-* are their own set. For a new user, it seems more obvious that to-rebol-file and to-local-file would go together, I think. |
Anton 11-Sep-2009 [14733] | I think the way things are with TO-FILE and TO-REBOL-FILE is just fine. I would be annoyed if TO-FILE took had the more complex functionality of TO-REBOL-FILE. I agree with BrianH. |
RobertS 16-Sep-2009 [14734] | Could I ask why rebzip.r will only unzip a gzip if the console is launched from rebview ( in this case 2.7.6) but not from rebcore? thanks |
Dockimbel 16-Sep-2009 [14735x2] | I guess it's because it relies on the PNG decoder for decompression which comes only with /View engine. |
Btw, congratulation to the author, Vincent Ecuyer for this great library! | |
Maxim 17-Sep-2009 [14737x2] | anyone know of a way to get a persistent value based on someone's computer... the longer the string the better... (on windows) this is with a /command license, so any accessible rebol feature is usable. something like: -System install serial number -Disk serial number -CPU id I want to generate an encryption key which isn't stored as part of the code. It just makes it a bit more complicated to reverse engineer the stored password if the encryption key is different for all installations. |
this value is only the basis for an intense series of string manipulations which make even the original data useless unless someone has the exact algorythm which generated the key. | |
Graham 17-Sep-2009 [14739] | MAC address ?? |
Maxim 17-Sep-2009 [14740] | how do I get that info into rebol? |
Graham 17-Sep-2009 [14741x2] | get-modes ?? |
or not | |
Pekr 17-Sep-2009 [14743x2] | I am not sure get-modes gets you a mac address .... |
you can as well use some power of command line - parse results of commands like ipconfig, arp -a, etc. | |
Maxim 17-Sep-2009 [14745x3] | ahh. yes... doing a dir returns the volume name and serial number in one shot :-) perfect. |
so I'll just call and use the result string! | |
btw, thanks pekr don't know why I didn't of such a simple solution.... to much PITL dev I guess ;-) | |
Pekr 17-Sep-2009 [14748] | yes. The same went for my news-scroller. I just tried to outline it in REBOL, thinking someone should do it in some PITL environment. Then I saw my brother using it in PC Shop on his LCD TV. I asked him - hey, wait till someone makes final version, and he replied - it works, no? And then I thought to myself - can I regard 2 pages of code being actually an application? :-) |
Maxim 17-Sep-2009 [14749] | hehe |
Gabriele 19-Sep-2009 [14750] | max, it always scares me when people think that obscurity is a form of security... |
Maxim 19-Sep-2009 [14751x2] | Gab, are you saying that my idea is only obscurity, or that its the proper approach? just want to confirm what you mean. the |
the idea is for the encryption key to a stored password is created dynamically via an algorythm. If the software is encapped, then its a pretty safe system IMHO. But if the software stays open source (and interpreted), at least I can use some natives for which the key-gen algorythm is hard to reverse engineer. Although someone with rebol know-how can obviously get the passwd by running the algorythm manually, there is no way around this AFAIK. | |
Gabriele 20-Sep-2009 [14753x2] | There is no way to protect a password you are saving. Normally, you just want to obfuscate it so that it does not jump to the eyes when someone is looking. |
if the file containing the password is accessible to other people, then the password is accessible to other people. | |
Maxim 20-Sep-2009 [14755x3] | but that is true of all passwords on a computer even login passwds. |
but an encrypted password, without the key isn't usable if you don't know the key. | |
or even the algorythm its encoded with | |
Gabriele 20-Sep-2009 [14758x3] | If you think that keeping the algorithm secret increases the security of your encryption then you should not be writing an encryption algorithm. it's that simple. :) |
The application knows the key, so anyone that can access the application knows the key. | |
the only way to keep a password secret if your files are accessible to other people is to not store it into a file. | |
Maxim 20-Sep-2009 [14761] | you mean like in the registry? |
Henrik 20-Sep-2009 [14762] | I've wondered how useful it is not to store the password itself, but encrypting each keypress instead on top of the last keypress. |
Maxim 20-Sep-2009 [14763] | know that I understand that ultimately there is no method to hide any data. |
older newer | first last |