In article ,
Cooch wrote:
>
>I want to implement such specific feature:
>I have a server written in Python. I have a client written in C++. I
>want to use Python as network protocol between them. I mean: client
>send to server such string: "a = MyObject()", so object of
On Tue, Nov 10, 2009 at 2:08 PM, Steven D'Aprano
wrote:
> On Tue, 10 Nov 2009 12:28:49 -0500, geremy condra wrote:
>
>> Steven, remember a few weeks ago when you tried to explain to me that
>> the person who was storing windows administrative passwords using a 40
>> byte xor cipher with the hardco
Steven D'Aprano wrote:
I can only repeat what I said to Daniel: can you guarantee that the nice
safe, low-risk environment will never change? If not, then choose a more
realistic threat model, and build the walls of your locked box
accordingly.
Seems to me you can't really *guarentee* anythin
Daniel Fetchinson wrote:
I'm the king in my castle, although I'm fully aware of the fact that my castle
might be ugly from the outside :)
+1 QOTW
--
http://mail.python.org/mailman/listinfo/python-list
>> My point is that hacking can still be a fun and easy-going activity
>> when one writes code for himself (almost) without regards to security
>> and nasty things like that creeping in from the outside. I'm the king
>> in my castle, although I'm fully aware of the fact that my castle
>> might be u
Grant Edwards wrote:
> On 2009-11-10, Steven D'Aprano wrote:
>>> How do you know for sure? Maybe the OP wants to use this thing
>>> with 3 known researchers working on a cluster that is not even
>>> visible to the outside world.
>
> And those three researchers are perfect? They've never even
> ma
My point is that hacking can still be a fun and easy-going activity
when one writes code for himself (almost) without regards to security
and nasty things like that creeping in from the outside. I'm the king
in my castle, although I'm fully aware of the fact that my castle
might be ugly from the o
On Tue, 10 Nov 2009 12:28:49 -0500, geremy condra wrote:
> Steven, remember a few weeks ago when you tried to explain to me that
> the person who was storing windows administrative passwords using a 40
> byte xor cipher with the hardcoded password might not be doing something
> stupid because I di
>>> This is a *really* bad idea.
>>
>> How do you know for sure? Maybe the OP wants to use this thing with 3
>> known researchers working on a cluster that is not even visible to the
>> outside world. In such a setup the model the OP suggested is a perfectly
>> reasonable one. I say this because I
>>> This is a *really* bad idea.
>>
>> How do you know for sure? Maybe the OP wants to use this thing with 3
>> known researchers working on a cluster that is not even visible to the
>> outside world. In such a setup the model the OP suggested is a
>> perfectly reasonable one. I say this because I
On Tue, Nov 10, 2009 at 10:56 AM, Steven D'Aprano
wrote:
> On Tue, 10 Nov 2009 16:31:13 +0100, Daniel Fetchinson wrote about using
> exec:
>
>>> This is a *really* bad idea.
>>
>> How do you know for sure? Maybe the OP wants to use this thing with 3
>> known researchers working on a cluster that i
Daniel Fetchinson schrieb:
I want to implement such specific feature:
I have a server written in Python. I have a client written in C++. I
want to use Python as network protocol between them. I mean: client
send to server such string: "a = MyObject()", so object of this type
will
On 2009-11-10, Steven D'Aprano wrote:
> On Tue, 10 Nov 2009 16:31:13 +0100, Daniel Fetchinson wrote about using
> exec:
>
>>> This is a *really* bad idea.
>>
>> How do you know for sure? Maybe the OP wants to use this thing
>> with 3 known researchers working on a cluster that is not even
>> vis
On Tue, 10 Nov 2009 16:31:13 +0100, Daniel Fetchinson wrote about using
exec:
>> This is a *really* bad idea.
>
> How do you know for sure? Maybe the OP wants to use this thing with 3
> known researchers working on a cluster that is not even visible to the
> outside world. In such a setup the mo
On Tue, Nov 10, 2009 at 16:31, Daniel Fetchinson
wrote:
>> This is a *really* bad idea.
>
> How do you know for sure? Maybe the OP wants to use this thing with 3
> known researchers working on a cluster that is not even visible to the
> outside world. In such a setup the model the OP suggested is
>> I want to implement such specific feature:
>> I have a server written in Python. I have a client written in C++. I
>> want to use Python as network protocol between them. I mean: client
>> send to server such string: "a = MyObject()", so object of this type
&
Cooch schrieb:
Hi, guys!
I want to implement such specific feature:
I have a server written in Python. I have a client written in C++. I
want to use Python as network protocol between them. I mean: client
send to server such string: "a = MyObject()", so object of this type
will appear
Hi, guys!
I want to implement such specific feature:
I have a server written in Python. I have a client written in C++. I
want to use Python as network protocol between them. I mean: client
send to server such string: "a = MyObject()", so object of this type
will appear in server. Any
18 matches
Mail list logo