comp.lang.idl-pvwave archive
Messages from Usenet group comp.lang.idl-pvwave, compiled by Paulo Penteado

Home » Public Forums » archive » Examine "Saved" IDL procedures now too!
Show: Today's Messages :: Show Polls :: Message Navigator
E-mail to friend 
Return to the default flat view Create a new topic Submit Reply
Re: Examine "Saved" IDL procedures now too! [message #29952 is a reply to message #29825] Tue, 26 March 2002 10:21 Go to previous messageGo to previous message
Randall Skelton is currently offline  Randall Skelton
Messages: 169
Registered: October 2000
Senior Member
On Tue, 26 Mar 2002, Paul van Delst wrote:

[snip]

> As for the sad folk that have a predisposition to ignore software license agreements, it seems
> to me they are always going to be around - both the sophisticated and the brain-dead. If a
> software developer makes it easy for people to hack code, then of course more people will do
> it. If one is really serious about distributing and protecting proprietary code, I would think
> a not insignificant amount of time and resources would need to be dedicated to this end - and
> that would more than likely involve legal resources. Anything less would seem to be the
> equivalent of finger-crossing and hoping for the best.
>
> All the above is purely my badly informed personal opinion. :o)

I agree. The only way for this to be resolved is for RSI to step up and
define a system whereby IDL code can be massaged into a somewhat
tamper-resistant form. What about using some sort of key-generated
encryption scheme that developers need to buy into? This way, every
registered 'IDL developer' would get a a strong encryption tool and a set
of keys to encrypt their source. RSI would be responsible for the
maintenance and security of both the encryption tool and keys. When a
user gets one of these encrypted files from a developer, they simply place
it in the IDL path like any other .pro file and when needed IDL would
auto-magically decrypt the code into a compiled procedure, function or
object set. Assuming that RSI uses a modern, strong encryption scheme,
the chances of the source file being decoded would be small. Alas,
depending on how RSI represents the compiled functions, procedures and
objects in IDL's working memory, it may still be possible to recover the
the source...

Comments?
Randall
[Message index]
 
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Previous Topic: Re: _EXTRA inheritance crashing IDL
Next Topic: Rotation of 3D image in Object Graphics

-=] Back to Top [=-
[ Syndicate this forum (XML) ] [ RSS ] [ PDF ]

Current Time: Sat Oct 11 06:57:42 PDT 2025

Total time taken to generate the page: 1.44139 seconds