Well, I'm no perl guru, but I know it IS possible to obfuscate the code enough that no one in their right mind could read it... for example:
Try running that... Then try to figure it out...
I'm calling a program with a command line arguement containing a password. while the process is running anyone on the system can ps -ef and see the password. Is there a way to prevent this from happening.
example
PROGRAM USERNAME/PASSWD
I've also tried
PROGRAM `cat passfile`
... (7 Replies)
Is there anyone who knows how to hide an IP from being logged by the site you are visiting. I know of some paid companies but I am looking for a different solution. Is there some way in UNIX to mask the ip.
Help this is urgent.
Datopdog (1 Reply)
Hi all,
This is my first post in this forum. Searched the threads, couldn't get information about this.
I have developed a web-based tool using CGI. The code consists of cgi files (.cgi) and functions written as Perl Modules( .pm files). As it is the tool works perfect.
Now is there... (4 Replies)
Hi all,
Sometime back, had put up a Q regarding hiding perl code.
A: There is a utility known as 'pp' which comes along with PAR. Downloaded from
CPAN. These people have done wonderful work I must say. Cool executables from
perl scripts.
Have one more... (4 Replies)
Hello. A bit of a puzzle here:
I have a 3rd party executable, which requires the following parameters:
parm1 = program_name, parm2=userid/password, parm3=additional flags.
We tried passing password as a variable, but you can do grep, and see what the password actually is
I found a bit... (2 Replies)
class B
{
public:
void fns(void){//base def;}
};
class D:public B
{
public:
void fns(void) {//new def;}
};
I was thinking the above is overriding but somewhere else i found the above is just hiding.Only virtual functions can be considered as overriding?
This is the exact statement ... (1 Reply)
Is there a way to see or print a sub code?
Sometime a sub could be already defined, but in the debug mode (so, interactively) it could be already out of screen.
So, I would think about a way to check if the sub is defined (just 'defined' is not a problem) and how it is defined.
Also, if... (4 Replies)
Hi,
plz see the below code , i have catch the file "Orders.20110714.out "file
as a Orders*.out. but it giving me an error .it does not open the file.
if the same thing i have done by code
code-> ls Orders*.out then it gives me the output
Orders.20110714.out
i am trying apply the... (1 Reply)
How can we share a script without actually sharing the code?
I have 4 scripts in my system.
The end user has to execute the first file and based on the inputs (I am reading 1, 2 , 3 as options) my shell script will execute respective script files.
Now I dont want to share all the 4 script... (3 Replies)
Discussion started by: Dish
3 Replies
LEARN ABOUT DEBIAN
guru
GURU(8) System Manager's Manual GURU(8)NAME
guru - System administration
SYNOPSIS
guru [ -e program ] [ -f ] [ -p target ]
DESCRIPTION
guru is a sophisticated program synthesis and system maintenance tool developed after midnight in numerous university computing labs. It
is based on the famous LISP Hacker system, used to develop AI programs on TENEX. guru reads a problem description from the standard input.
An innovative and occasionally correct solution is generated and written to the standard output. Typically, guru is invoked repeatedly
until an acceptable solution is generated or the user community has learned to live with the problem.
The bugreport mechanism sometimes invokes guru. In this case guru executes at a priority inversely proportional to the reported urgency of
the bug. Feature enhancements run at high priority whereas critical problems are fixed only when the machine would otherwise be idle.
If the standard input is empty, guru uses its program synthesis capabilities to generate a selection of screen editors, X widgets, compil-
ers, sundry games and the occasional diatribe.
OPTIONS -e program
New features are added to an existing program. This option should be used with caution as the enhanced program may behave unpre-
dictably or not at all.
-f Reconstructs filesystems after a crash.
-p target
Ports the entire system on which guru is executing to target, preferably a RISC machine. This is an extremely time consuming oper-
ation and is not guaranteed to terminate.
If more than one option is specified, guru may thrash. Each copy of guru has its own set of unique, additional and undocumented options.
SEE ALSO
YAPS: Yet another Program Synthesiser by S C Johnson.
NOTES
Inherent design limitations prevent guru from synthesising comments. The programs generated are undocumented. The lucidity, politeness,
relevance and language of the occasional diatribe vary considerably.
The only diagnostic is an occasional ``I deserve a raise'' - which may be ignored albeit doing so may provoke ``I resign'' - an unrecover-
able error.
Sending the output of one guru into another can produce quite startling results.
UNIX Programmer's ManualGURU(8)