Robert Latest <[EMAIL PROTECTED]> writes:
> And, contrary to the advice I gave elsethread, unfortunately it's
> impossible to just drop uncooperative customers when you develop GPL
> software ;-)
On the contrary. The GPL includes a big fat "NO WARRANTY" clause. If
you're not selling warranties to
On Mon, 14 Jan 2008 12:46:48 +, Robert Latest wrote:
> And, contrary to the advice I gave elsethread, unfortunately it's
> impossible to just drop uncooperative customers when you develop GPL
> software ;-)
Just because you are writing GPLed code doesn't mean you are permanently
linked to an
> -Original Message-
> From: [EMAIL PROTECTED] [mailto:python-
> [EMAIL PROTECTED] On Behalf Of Paul Sijben
> Sent: Friday, January 11, 2008 4:45 AM
> To: python-list@python.org
> Subject: encrypting python modules
>
>
> The problem: I have a client-server ap
Steven D'Aprano wrote:
> No, it's a serious question. You distribute Python code, and you're
> worried that your users will modify the source code and then neglect to
> mention it when they report bugs which they introduced.
>
> Before you build an elephant-proof fence around your house, it is q
Paul Sijben wrote:
>>
>> You could check the MD5 hashes of your files.
>
> indeed but I still need to hook into import to do that reliably, right?
Depends. In a job I once had I just supplied a shell script that spat out
the MD5 sums of my sources. When I got a support request I had the customer
On Mon, 14 Jan 2008 09:49:49 +0100, Paul Sijben wrote:
>> How often do these things *actually* happen?
>>
>> Of those that actually do it, how many are clueless enough that when
>> they run into problems they blame you for it? (And remember that you
>> won't even find out about the non-clueless o
Robert Latest wrote:
> Paul Sijben wrote:
>
>> The problem: I have a client-server app written in python. I want to
>> make sure that the client is not:
>> 1) destabilized by users accidentally or on purpose dropping python
>> files in the path (after which calling the helpdesk will not be useful)
Paul Sijben wrote:
> The problem: I have a client-server app written in python. I want to
> make sure that the client is not:
> 1) destabilized by users accidentally or on purpose dropping python
> files in the path (after which calling the helpdesk will not be useful)
> 2) extended with "new feat
Mike,
thanks for the constructive feedback.Indeed i probably need to patch
import in some way. Looks like there is no standard way to get this
done. So I guess I have do it myself...
In the famous last words department: how hard can that be? ;-)
Paul
Mike Meyer wrote:
> On Sat, 12 Jan 2008 09
> How often do these things *actually* happen?
>
> Of those that actually do it, how many are clueless enough that when they
> run into problems they blame you for it? (And remember that you won't
> even find out about the non-clueless ones.)
>
>
This is a rethorical question, right?
--
http
Marc 'BlackJack' Rintsch <[EMAIL PROTECTED]> writes:
> On Sat, 12 Jan 2008 09:47:26 +1100, Ben Finney wrote:
>
> > Trying to make bits uncopyable and unmodifiable is like trying to
> > make water not wet.
>
> Certainly not. I can put water into the freezer
Turning it into ice, and making it no
On Sat, 12 Jan 2008 09:47:26 +1100, Ben Finney wrote:
> Trying to make bits uncopyable and unmodifiable is like trying to make
> water not wet.
Certainly not. I can put water into the freezer, but I have no idea how
to make bits uncopyable and unmodifiable while still delivering them to
the clie
On Fri, 11 Jan 2008 10:44:36 +0100, Paul Sijben wrote:
> Hello,
>
> this question has come by repeatedly in several guises over the past
> years but has never been solved in this forum as far as I have been able
> to Google.
>
> However since so many people are asking the question, I hope someon
On Sat, 12 Jan 2008 09:47:26 +1100 Ben Finney <[EMAIL PROTECTED]> wrote:
> Paul Sijben <[EMAIL PROTECTED]> writes:
> > I know that I can not stop a dedicated hacker deconstructing my code.
> A direct consequence of this is that you can not stop *anyone* from
> deconstructing your code if it's in t
Paul Sijben <[EMAIL PROTECTED]> writes:
> I know that I can not stop a dedicated hacker deconstructing my code.
A direct consequence of this is that you can not stop *anyone* from
deconstructing your code if it's in their possession. It takes only
one dedicated, skilled person to crack your obfus
Hello,
this question has come by repeatedly in several guises over the past
years but has never been solved in this forum as far as I have been able
to Google.
However since so many people are asking the question, I hope someone has
made a solution and is willing to share it.
The problem: I have
16 matches
Mail list logo