TheSwamp
Code Red => AutoLISP (Vanilla / Visual) => Topic started by: nonsmall on September 19, 2013, 12:46:25 AM
-
Command : TT
then Point two points
Part of the code:
.............. (CdLbUiHq99)(GxBqQd38)(LtNpWm59)(JiOuTx51)(VkGnXaBsXk90)(LbOoIt61)(GsOtVo76)(RqXyXwMr92)(QtEmEtPg17)(VcAuFp96)(IbLbPnBe62)(PjQeLkWlBv46)(ShXyXiCw40)(ScTuAkMp82)(VbNoErXp65)(LrYmMsMdIj52)(XxXkFbXjKe29)(YnJqGf15)(YmNaJqVs33)(AyVvBhQfAk37)(CrJvUg77)(RkKrBvOy19)(MxMlKdHcSr43)(NrLqEiBpIw43)(FdFbXbPpFq68)(McUgVg77)(UcNuSrUs90)(NkTnQqJc35)(XqEeAaUjLr73)(DpLqLtSqJs17)(NsBqUkMdBs66)(VdJxWuYi42)(JrTiLiPu46)(UlBcEg25)(YrTdYsRnQj14)(NdMmDdPx56)(OlBnHa31)(SpBhEdGdWp5)(WyKsWo84)(XjDqRy71)(LmEtDxTiOm57)(FtNwVbYp79)(JrArEaYj15)(EmPaOiMpNi86)(SmMlSsCa33)(DyNaRiNcTm15)(PwFhPv77)(BuPiJpEy70)(QvMqEh53)(NrYrYfBtGl59)(XjAdBvNbUu68)(WjWmNoOb17)(FdIbUvUgTm66)(QqDnKqIiXg30)(SgHvTaNrUp91)(UmAgPkPn88)(CxKeJoKp92)(KtDgBcVdHv34)(YwCaMlMxPj9)(WjOmYwYs35)(QsGoGpXrGp20)(EaUkWyTd20)(IbQdOlOfWd59)(HrWpGwIh36)(JuYbMr23)(PrCyEo7)(XsNnNdDt92)(OgGtJuWyKd94)(WvNgPx86)(JhEvQtEcPc50)(JnPbFgWy53)(XcRkBeGs35)(KfLcPqDgRx78)(YmDfRx51)(RvBxNcJa47)(HxBlXa86)(DrHoXpVyKg77)(WrJaBm31)(QgPvIt29)(TdTlTlFg9)(KrEfIa21))
-
Another version
Increase the invalid code
-
Is there a story to go with this code ??
-
Is there a story to go with this code ??
lol, are you finding his posts cryptic? :D
-
FAS can be decompiled !!!
So I created encrypted programs.
-
Is there a story to go with this code ??
lol, are you finding his posts cryptic? :D
-
FAS can be decompiled !!!
So I created encrypted programs.
goog idea
of course it won't stop a hacker but will make his work a bit more difficult
-
Can someone fill me in on the advantages if any to encrypting a LISP file?
If you created it at your place of employment it's the company's property. I can see if you don't want anyone editing it but I've never heard of a coworker editing and breaking a working lisp.
-
One "problem" commonly encountered is a company spends years getting everything just-so. A new employee comes in, then later quits and moves to another company taking that code and support files with them without asking permission. Now the new employer is competing on the same grounds without lifting a finger. Illegal? Probably not. Unethical, certainly.
-
People still use AutoCAD??
-
Can someone fill me in on the advantages if any to encrypting a LISP file?
...
I can. Without any order defined:
- Protect intellectual property
- This protects the code and therefore prevents modifications
- The modification of the code without the authorization of the company represents a waste of time and money
-
People still use AutoCAD??
No, I'm using SolidWorks. But your question does not make much sense, if we only need to edit/view drawings that are not geared to any specific branch of engineering, or do not need specific functions...probably enough with autocad
Anyway most Autodesk products are based on Autocad , therefore the right question is: Who does not use autocad?
sorry if I have not explained it better, but I do not speak English.
-
interesting.
it makes my autocad very sad however
-
Thank you for your reply, I am engaged in second development of CAD, but Mine's a free profession,
My encryption technology is my own property.
now I am engaged in LISP training, many students worried about their programs would be decompiled,
so they asked me for help, it is the story my encryption technology come into being.
-
with the amount of knowledge in this forum, if anyone who knows how to code and wants to modify someone elses code, all they would have to do is come here an ask for some help and write their own code thats similar.
i fail to see the logic of coming on here, asking for, or offering help and then encrypt your code so no one else can modify it.
-
One "problem" commonly encountered is a company spends years getting everything just-so. A new employee comes in, then later quits and moves to another company taking that code and support files with them without asking permission. Now the new employer is competing on the same grounds without lifting a finger. Illegal? Probably not. Unethical, certainly.
If the code was created on company time, or using company software/hardware, then the code is company property. under copyright law it's a 'work for hire'. So yeah, Gieseppe Drafter taking a copy with him to his next employer is in fact illegal, and both he and the new employer are probably liable for statutory damages, and or violating trade secrets. either can get pricy - and doubling them up is bankruptcy worthy.
-
hello, I imagine using the method of "obfuscation" serious question: the execution of the code will be slow??? thank you very much
-
hello, I imagine using the method of "obfuscation" serious question: the execution of the code will be slow??? thank you very much
That depends on implementation e.g. decrypt to standard LSP content, load decrypted content. Zero run-time difference to unencrypted LISP, slight delay on loading during decryption process.
-
Another version
Increase the invalid code
Command : TT
then Point two points
Part of the code:
.............. (CdLbUiHq99)(GxBqQd38)(LtNpWm59)(JiOuTx51)(VkGnXaBsXk90)(LbOoIt61)(GsOtVo76)(RqXyXwMr92)(QtEmEtPg17)(VcAuFp96)(IbLbPnBe62)(PjQeLkWlBv46)(ShXyXiCw40)(ScTuAkMp82)(VbNoErXp65)(LrYmMsMdIj52)(XxXkFbXjKe29)(YnJqGf15)(YmNaJqVs33)(AyVvBhQfAk37)(CrJvUg77)(RkKrBvOy19)(MxMlKdHcSr43)(NrLqEiBpIw43)(FdFbXbPpFq68)(McUgVg77)(UcNuSrUs90)(NkTnQqJc35)(XqEeAaUjLr73)(DpLqLtSqJs17)(NsBqUkMdBs66)(VdJxWuYi42)(JrTiLiPu46)(UlBcEg25)(YrTdYsRnQj14)(NdMmDdPx56)(OlBnHa31)(SpBhEdGdWp5)(WyKsWo84)(XjDqRy71)(LmEtDxTiOm57)(FtNwVbYp79)(JrArEaYj15)(EmPaOiMpNi86)(SmMlSsCa33)(DyNaRiNcTm15)(PwFhPv77)(BuPiJpEy70)(QvMqEh53)(NrYrYfBtGl59)(XjAdBvNbUu68)(WjWmNoOb17)(FdIbUvUgTm66)(QqDnKqIiXg30)(SgHvTaNrUp91)(UmAgPkPn88)(CxKeJoKp92)(KtDgBcVdHv34)(YwCaMlMxPj9)(WjOmYwYs35)(QsGoGpXrGp20)(EaUkWyTd20)(IbQdOlOfWd59)(HrWpGwIh36)(JuYbMr23)(PrCyEo7)(XsNnNdDt92)(OgGtJuWyKd94)(WvNgPx86)(JhEvQtEcPc50)(JnPbFgWy53)(XcRkBeGs35)(KfLcPqDgRx78)(YmDfRx51)(RvBxNcJa47)(HxBlXa86)(DrHoXpVyKg77)(WrJaBm31)(QgPvIt29)(TdTlTlFg9)(KrEfIa21))
I'm sorry, but this is a very weak defense.
Such protection is much weaker than the vlx and can be broken without the knowledge of AutoCAD any programmer. I think I'll be able to remove this protection in the five lines of Lisp... :-(
For protection, I recommend using the unique capabilities AutoCAD.
Using standard and predictable data that is generated in the program will use them as keys for decryption. for example, can be geometrically tangent or other data that are further used in the program. To break such a program would be necessary to examine her work in AutoCAD. This will require a hacker to find a unique knowledge of the designer...