comp.lang.idl-pvwave archive
Messages from Usenet group comp.lang.idl-pvwave, compiled by Paulo Penteado

Home » Public Forums » archive » Examine "Saved" IDL procedures now too!
Show: Today's Messages :: Show Polls :: Message Navigator
E-mail to friend 
Return to the default flat view Create a new topic Submit Reply
Re: Examine "Saved" IDL procedures now too! [message #29958 is a reply to message #29825] Tue, 26 March 2002 09:09 Go to previous messageGo to previous message
Paul van Delst is currently offline  Paul van Delst
Messages: 364
Registered: March 1997
Senior Member
"Pavel A. Romashkin" wrote:
>
> Randall Skelton wrote:
>
>> I honestly hope this isn't the case. Nevertheless, most developers should
>> be distributing license agreements or have contracts with customers that
>> clearly state the software terms of use.
>
> This is got to be a sad joke. After frequenting MS Access newsgroup I
> know exactly what developers think about others seeing their code that
> they did not want available to the entire world. They get not just mad,
> but MAD! And I have yet to see an end user license agreement that is not
> being violated every single day, OSs being the prime example.
> Like Ronn said, this had to happen. Anyone who ever opened a SAV file in
> an editor saw that it can be hacked. Let's see what is going to come out
> of this. Maybe RSI will now offer Craig a job and we'll get one of us
> among them? Or would it be losing one of us to them?
> Pavel

Since I'm not at all familiar with the methods one uses to distribute proprietary IDL code, can
I ask how is it done? If SAV files are the popular choice, why? Particularly if they're so easy
to hack (and, as another poster pointed out, it doesn't look like RSI made any statements about
SAV file security, or lack thereof, for distributing code.)

As for the sad folk that have a predisposition to ignore software license agreements, it seems
to me they are always going to be around - both the sophisticated and the brain-dead. If a
software developer makes it easy for people to hack code, then of course more people will do
it. If one is really serious about distributing and protecting proprietary code, I would think
a not insignificant amount of time and resources would need to be dedicated to this end - and
that would more than likely involve legal resources. Anything less would seem to be the
equivalent of finger-crossing and hoping for the best.

All the above is purely my badly informed personal opinion. :o)

paulv

--
Paul van Delst Religious and cultural
CIMSS @ NOAA/NCEP purity is a fundamentalist
Ph: (301)763-8000 x7274 fantasy
Fax:(301)763-8545 V.S.Naipaul
[Message index]
 
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Previous Topic: Re: _EXTRA inheritance crashing IDL
Next Topic: Rotation of 3D image in Object Graphics

-=] Back to Top [=-
[ Syndicate this forum (XML) ] [ RSS ] [ PDF ]

Current Time: Fri Oct 10 06:59:17 PDT 2025

Total time taken to generate the page: 1.20495 seconds