Subject: | Re: Library Hex Editing Experiment
| Date: | 9 Mar 2023 23:24:31 -0400
| From: | "Kevin Zawicki" <numberjack@wi.rr.com>
| Newsgroups: | pnews.paradox-programming
|
Hmmm, this is delivered, so basically compiled. A hex editor would not "uncompile"
it to viewable?
The source code is removed.
We can tell it was likely Paradox 9.
As far as I know, there is no way to decompile. The "text" you see are symbols
of the code.
I think this would practically be safe, but not protect the data in a table.
Peter <peterspammenot@whiteknight.email> wrote:
>
>I have attached two delivered libraries with sample data containing
>employee name and ID number. Nothing else.
>
>I'm hoping someone has time to open each with a hex editor to let me
>know if they can see sensitive information. I tried but saw nothing
>other than the names, but I don't know much about hacking.
>
>Int.ldl
>has a dynarray with three elements in the format
>var dynint dynarray[]smallint
>
>dynInt["Jack"] = 99
>dynInt["Jill"] = 5
>dynInt["Sam"] = 105
>
>The names can be seen but can the smallint value be seen?
>
>
>Str.ldl
>var dynname dynarray[]string
>
>dynName[99] = "Jack"
>dynName[5] = "Jill"
>dynName[105] = "Sam"
>
>Again, the names can be seen but can the elements be seen?
>
|