Takes me back.GOTO is more free, you can jump anywhere you want, there are no restrictions.
I remember GOTO and GOSUB from the first program I wrote as a kid on the apple IIe.
Coolio! I took my first programming course on a IIC. The instructor was aghast and extremely apologetic at course end as he couldn’t assign the final grade I had achieved - his grades app would only accept values 0-99. It was then when I knew I was on to something, lol. :lol:The programming language I learned in school was Fortran77, and I learned it on an apple ii, which had a green screen and a series of English letters. I didn't understand English then
Coolio! I took my first programming course on a IIC. Th
len=php_strlen(utmZone);
// Changed from utmZone.Last as the Linq version is much slower than simply indexing
// the last position in the string's array of characters
if (len>1)
{ isNorthHemisphere = substr(utmZone,len,1),
diflat = -0.00066286966871111111111111111111111111,
diflon = -0.0003868060578,
utmZone = substr(utmZone,1,len-1);
c_sa = 6378137.000000;
c_sb = 6356752.314245;
e2 = math_pow((math_Pow(c_sa, 2) - Math_Pow(c_sb, 2)), 0.5) / c_sb;
e2cuadrada = Math_Pow(e2, 2);
c = math_pow(c_sa, 2) / c_sb;
x = utmX - 500000;
isNorthHemisphere =(isNorthHemisphere >"N")?T:nil;
y = isNorthHemisphere ? utmY : utmY - 10000000;
zone=atoi(utmZone);
s = ((zone * 6.0) - 183.0);
lat = y / (6366197.724 * 0.9996); // Change c_sa for 6366197.724
v = (c / math_pow(1 + (e2cuadrada * math_pow(cos(lat), 2)), 0.5)) * 0.9996;
a = x / v;
a1 = sin(2 * lat);
a2 = a1 * math_pow((cos(lat)), 2);
j2 = lat + (a1 / 2.0);
j4 = ((3 * j2) + a2) / 4.0;
j6 = (5 * j4 + a2 * math_pow((cos(lat)), 2)) / 3.0; // saque a2 de multiplicar por el coseno de lat y elevar al cuadrado
alfa = (3.0 / 4.0) * e2cuadrada;
beta = (5.0 / 3.0) * math_pow(alfa, 2);
gama = (35.0 / 27.0) * math_pow(alfa, 3);
bm = 0.9996 * c * (lat - alfa * j2 + beta * j4 - gama * j6);
b = (y - bm) / v;
epsi = ((e2cuadrada * math_pow(a, 2)) / 2.0) * math_pow((cos(lat)), 2);
eps = a * (1 - (epsi / 3.0));
nab = (b * (1 - epsi)) + lat;
senoheps = (math_exp(eps) - Math_Exp(-eps)) / 2.0;
delt = atan(senoheps / (cos(nab)));
tao = atan(cos(delt) * sin(nab) / cos(nab));
longitude = (delt / Math_PI) * 180 + s;
latitude = (((lat + (1 + e2cuadrada * math_pow(cos(lat), 2) - (3.0 / 2.0) * e2cuadrada * sin(lat) * cos(lat) * (tao - lat)) * (tao - lat))) / Math_PI) * 180.0; // era incorrecto el calculo
rr=strcat("\nLatitud: " ,rtos(latitude,2,12),"\tLongitud: " , rtos(longitude,2,12));
The programming language I learned in school was Fortran77, and I learned it on an apple ii, which had a green screen and a series of English letters. I didn't understand English then
Yesterday, I compile this source to (fas for Autocad) and (des for BrisCad)
The programe Decompilator-exe can restore ...
Why do you say there is no GOTO you can use defun statements, I wrote a bubble sort that required dual defuns for the testing part and looping through the data set. Took a BASIC version and rewrote in lisp.
Ps here is my GOTO Autocad command.
What language is this?Coolio! I took my first programming course on a IIC. Th
Yesterday, I compile this source to (fas for Autocad) and (des for BrisCad)
The programe Decompilator-exe can restore, reveal 100%autolisp-source?Code: [Select]len=php_strlen(utmZone);
// Changed from utmZone.Last as the Linq version is much slower than simply indexing
// the last position in the string's array of characters
if (len>1)
{ isNorthHemisphere = substr(utmZone,len,1),
diflat = -0.00066286966871111111111111111111111111,
diflon = -0.0003868060578,
utmZone = substr(utmZone,1,len-1);
c_sa = 6378137.000000;
c_sb = 6356752.314245;
e2 = math_pow((math_Pow(c_sa, 2) - Math_Pow(c_sb, 2)), 0.5) / c_sb;
e2cuadrada = Math_Pow(e2, 2);
c = math_pow(c_sa, 2) / c_sb;
x = utmX - 500000;
isNorthHemisphere =(isNorthHemisphere >"N")?T:nil;
y = isNorthHemisphere ? utmY : utmY - 10000000;
zone=atoi(utmZone);
s = ((zone * 6.0) - 183.0);
lat = y / (6366197.724 * 0.9996); // Change c_sa for 6366197.724
v = (c / math_pow(1 + (e2cuadrada * math_pow(cos(lat), 2)), 0.5)) * 0.9996;
a = x / v;
a1 = sin(2 * lat);
a2 = a1 * math_pow((cos(lat)), 2);
j2 = lat + (a1 / 2.0);
j4 = ((3 * j2) + a2) / 4.0;
j6 = (5 * j4 + a2 * math_pow((cos(lat)), 2)) / 3.0; // saque a2 de multiplicar por el coseno de lat y elevar al cuadrado
alfa = (3.0 / 4.0) * e2cuadrada;
beta = (5.0 / 3.0) * math_pow(alfa, 2);
gama = (35.0 / 27.0) * math_pow(alfa, 3);
bm = 0.9996 * c * (lat - alfa * j2 + beta * j4 - gama * j6);
b = (y - bm) / v;
epsi = ((e2cuadrada * math_pow(a, 2)) / 2.0) * math_pow((cos(lat)), 2);
eps = a * (1 - (epsi / 3.0));
nab = (b * (1 - epsi)) + lat;
senoheps = (math_exp(eps) - Math_Exp(-eps)) / 2.0;
delt = atan(senoheps / (cos(nab)));
tao = atan(cos(delt) * sin(nab) / cos(nab));
longitude = (delt / Math_PI) * 180 + s;
latitude = (((lat + (1 + e2cuadrada * math_pow(cos(lat), 2) - (3.0 / 2.0) * e2cuadrada * sin(lat) * cos(lat) * (tao - lat)) * (tao - lat))) / Math_PI) * 180.0; // era incorrecto el calculo
rr=strcat("\nLatitud: " ,rtos(latitude,2,12),"\tLongitud: " , rtos(longitude,2,12));
made code messy and yucky.That's the purposeWhy do you say there is no GOTO you can use defun statements, I wrote a bubble sort that required dual defuns for the testing part and looping through the data set. Took a BASIC version and rewrote in lisp.
Ps here is my GOTO Autocad command.
GOTO is a very old programming concept and/or "thing". GOTO is for compiled languages and it is translated by the compiler as a "statement to jump to a specific memory address". ...stack/heap discussions abound.
NOTE: you can also use GOTOs in windows command scripts too for a good visual aid of how they were used (made code messy and yucky).
The example used in the first post is quite interesting but I agree with VovKa.
Why do you say there is no GOTO you can use defun statements, I wrote a bubble sort that required dual defuns for the testing part and looping through the data set. Took a BASIC version and rewrote in lisp.thank you
Ps here is my GOTO Autocad command.
RE:Why do you say there is no GOTO you can use defun statements, I wrote a bubble sort that required dual defuns for the testing part and looping through the data set. Took a BASIC version and rewrote in lisp.
:whistling:
Even today i keep this Qsort.lisp(after 25years). I think is very good-source. You can replace Bsort.Lsp with qsort.lspCode: [Select];Lisp2C
;AutoLISP to C (ADS) Translator User's Manual, Version 2.9, 1st revision
;(C) 1993, 1995 BASIC d.o.o Jesenkova 5, 61000 Ljubljana, Slovenia
;Tel: +386 1 314 069Fax: +386 1 318 211e-mail:Jure Spiler jure @basic.siJoze Marincek
joze.marincek@mat.uni-lj.siCompuServe: [70541,1765]
;;implementat la (_lspfn_list_qsort)
(defun Qsort (lst / x l e g)
(if lst
(progn
(setq x (nth (/ (length lst) 2) lst)
l nil e nil g nil)
(while (not (null lst))
(cond ((= (car lst) x) (setq e (cons x e)))
((< (car lst) x) (setq l (cons (car lst) l)))
(t (setq g (cons (car lst) g)))
)
(setq lst (cdr lst))
)
(setq l (Qsort l)
g (Qsort g))
(append l e g)
)
nil
)
)
Fas to LSP program is a commercial software written by my friend. It can be converted almost perfectly, and most of the LSP generated can be loaded and run normally. He sells the software for 200 dollars. You can provide an fas file and I will decompile it for you to seea crack software can claim itself as "commecial" software! shame
Crack usually means to modify, the software just translates, it doesn't change the content of the program
a crack software can claim itself as "commecial" software! shame
Lisp2C?
a crack software can claim itself as "commecial" software! shame
Crack usually means to modify, the software just translates, it doesn't change the content of the program
You don't understand me at all. I study conservation, not destruction. It is true that decompilation exists, and I want it to fail!a crack software can claim itself as "commecial" software! shame
Agree with you.Crack usually means to modify, the software just translates, it doesn't change the content of the program
Crack means that you are violating people's rights, in other words crackers = hackers = thieves ( burglars ).
I don't know why the admins allow you to post such threads in this esteemed and professional forum that is full of great people !
Crack means that you are violating people's rights, in other words crackers = hackers = thieves ( burglars ).
According to the law, in order to learn and study the design ideas and principles contained in the software, users who use the software by means of installation, display, transmission, storage, etc., do not need to obtain the license of the software copyright owner, and do not need to pay compensation to the owner
If I used a stick as a door lock to my house; who should I then be angry at if my house gets broken into?
You don't understand me at all. I study conservation, not destruction. It is true that decompilation exists, and I want it to fail!
Ignoring the fact that decompilers exist will not make them go away. baltang36 is posting methods to improve compilations through the use of better programming methods and information. Meaning: use the knowledge (s)he is posting to improve your programs/methods/etc. so your compiled programs are harder to decompile.Thank you for your understanding
Reverse engineering is really annoying, but it's a technology. We can't ignore it. As a lisp developer, we have to come up with a way to fight it. In fact, I have developed the Fas protector, pfas2. X, and dozens of LISP developers are using it. It can resist all the current decompilations and make it fail. I only sell it for $60.You don't understand me at all. I study conservation, not destruction. It is true that decompilation exists, and I want it to fail!
Please be patient with my frank questions.
1- If you are really working against decompilation, how could you know the return of functions as you already described in this thread without practicing decompilation yourself?
2- How can I trust what you have described and explained in this thread is not the opposite way for crackers to facilitate their process?
Can you give us a real example proving that ( question No. 2) ?
Finally, I believe that you are trying to get fame in this community for private messages requests asking you for decompliations and of course with paid fees which means that you are lurking behind a very transparent curtain that can't stand for too long for all users to get that truth.
You are not working against me because I don't have any complied programs yet but such a conduct cracks me up and I have seen many professional users publishing their applications for a few dollars and what you are presenting is against humanity and not only against their people's income.
Reverse engineering is not welcome anywhere.
I’m going to break into your house. I will lift some property while I’m there but worry not - I’m doing research - I will share with others how I was able to breach your security. In the end your house - and your friend’s houses - will be much safer - the property I lifted was merely an education fee.My research is to help you build walls so that no one can break into your house.
Reverse engineering is really annoying, but it's a technology. We can't ignore it. As a lisp developer, we have to come up with a way to fight it. In fact, I have developed the Fas protector, pfas2. X, and dozens of LISP developers are using it. It can resist all the current decompilations and make it fail. I only sell it for $60.
I have shared the practice, and someone has successfully applied this method and made tools. How can I answer you if you still doubt it?Reverse engineering is really annoying, but it's a technology. We can't ignore it. As a lisp developer, we have to come up with a way to fight it. In fact, I have developed the Fas protector, pfas2. X, and dozens of LISP developers are using it. It can resist all the current decompilations and make it fail. I only sell it for $60.
Its good to approve is that your goal to gain from ( protecting ) compiled programs as I already mentioned in my last reply although you did not prove if what you are discussing deserve to think of.
You did not reply to any of my questions which assure my points is that what you are sharing is just unreal analysis that no one can trust to even trust your applications.
If you purchase fish in a sea then that's your problem but you need to visit a psychologist as soon as possible. :uglystupid2:
i don't think this very thread is about crackingYou really understand. Thank you
it is about protecting, a kind of...
i find it quite useful
It's possible I've misunderstood the bent of this thread as I quickly perused it and I'm exhausted from a 64 hour work week that's not over yet. Will reread from the start sometime down the road; peace + cheers.64 hour work week?
MP!
- I normally work a 37.5 hour week.
- I’m 1 of a team of 5 working feverishly in response to challenges born of COVID-19 so our engineering team can all work remotely.
- I’m not being exploited, was not ordered to work. I stepped up to do my part to help out our company.
- I do the work gladly; grateful I have skills and experience that are useful to solve the challenges we’re experiencing.
- F**k Marxism.
You are a good employee and all bosses like you. Do you own shares in the company? Are you a shareholder?
- I normally work a 37.5 hour week.
- I’m 1 of a team of 5 working feverishly in response to challenges born of COVID-19 so our engineering team can all work remotely.
- I’m not being exploited, was not ordered to work. I stepped up to do my part to help out our company.
- I do the work gladly; grateful I have skills and experience that are useful to solve the challenges we’re experiencing.
- F**k Marxism.
Covid-19 is the common enemy of human beings, only by working together.MP!
- I normally work a 37.5 hour week.
- I’m 1 of a team of 5 working feverishly in response to challenges born of COVID-19 so our engineering team can all work remotely.
- I’m not being exploited, was not ordered to work. I stepped up to do my part to help out our company.
- I do the work gladly; grateful I have skills and experience that are useful to solve the challenges we’re experiencing.
- F**k Marxism.
COVID-19 has brought a crisis to the world. I hope that you and your family can protect yourself very well, pay attention to rest, wash your hands frequently, and go out with a mask. Now we are also working from home. Hope the epidemic will end soon!
i don't think this very thread is about cracking
it is about protecting, a kind of...
i find it quite useful
What language is this?
len=php_strlen(utmZone);
if (len>1)
{ isNorthHemisphere = substr(utmZone,len,1), diflat = -0.00066286966871111111111111111111111111,diflon = -0.0003868060578,
utmZone = substr(utmZone,1,len-1);c_sa = 6378137.000000;
c_sb = 6356752.314245;e2 = math_pow((math_Pow(c_sa, 2) - Math_Pow(c_sb, 2)), 0.5) / c_sb; e2cuadrada = Math_Pow(e2, 2);
c = math_pow(c_sa, 2) / c_sb; x = utmX - 500000;
isNorthHemisphere =(isNorthHemisphere >"N")?T:nil;
y = isNorthHemisphere ? utmY : utmY - 10000000;
zone=atoi(utmZone); s = ((zone * 6.0) - 183.0);
lat = y / (6366197.724 * 0.9996); // Change c_sa for 6366197.724
[/quote]thank you sir
nice research, baitang36, as alwaysIn this program, if the hacker removes c:zhuce, nothing will run. it exit.
how will uncoditional jumping protect your code?
the 'hacker' will simply delete c:zhuce function from the decompiled lsp.