that is the reason comparison is failing.
How ever is it possible to make python to compare actual C pointer,
rather than the PythonCObject Pointer.
Can some one please suggest
Regards,
Anand
--
http://mail.python.org/mailman/listinfo/python-list
r the suggestion
Regards,
Anand
Craig Ringer wrote:
On Thu, 2005-01-06 at 18:34, Anand K Rayudu wrote:
Here is my python code
import myModule
a=myModule.myAPI1("1")
b=myModule.myAPI2("name")
# basically both above functions return same C pointer.
# so i want t
Hi
Is there a simple way to extract words speerated by a space in python
the way i do it in awk '{print $4 $5}' . I am sure there should be some
but i dont know it.
Thanks
n00b
--
http://mail.python.org/mailman/listinfo/python-list
Hello
I have been developing a code that works pretty well on my python 2.3
and now when i am running it on my server where it is programmed to run
it's giving me errors. I have been using __contains__ method and it
fails on python 2.2
For example
(Python 2.3)
>> x="Hello World"
>> print x.__co
Hi
I see everybody talking about Eclipse and PyDev i have not used it but
just wanted to know how does it compares with Activestate Komodo?
thanks
Anand
Maurice LING wrote:
> Hi,
>
> It seems that you are just starting on Python, same as my situation a
> year ago. After almost go
around my scripts ???
thanks
Anand
--
http://mail.python.org/mailman/listinfo/python-list
bute.
Another approach could be calling Py_InitModule("myModuleName",
myMethods); with new help string. But It is not working,
So I am not sure what is the right way to do it
Thanks in advance for all your kind help
Regards,
Anand
--
http://mail.python.org/mailman/listinfo/python-list
ink this is better approach, kindly please let me know your comments
Regards,
Anand
On Aug 7, 2:54 am, Anand K Rayudu wrote:
Dear All,
We have extended and embedded python into my our application.
We exposed few APIs to python using
Py_InitModule("myModuleName", myMetho
.:: Unix and Linux Hacking and Security ::.
1. Unix - Vulnerabilities and Advisories
-- Tutorials and Papers
-- Specific Exploits and Vulnerabilities
2. Unix - Security Tools
-- Unix Security and Audit Tools (Including IDS and Access Control
Tools)
-- Unix Log Analysis Tools
-- Unix Proxies, Firew
201 - 209 of 209 matches
Mail list logo