Subject: | Re: Library Hex Editing Experiment
| Date: | Thu, 9 Mar 2023 22:03:33 -0700
| From: | Liz McGuire <liz@paradoxcommunity.com>
| Newsgroups: | pnews.paradox-programming
|
I can read various bits of text when opening the Int.ldl in TextPad, for example. This includes
things like "This program must be run under Microsoft Windows", "Borland" various event and
method names, and at the end of the file, "Jack", "Jill", and "Sam".
I see the same sorts of things in Str.ldl - I'm not going to do a bit by bit compare, but they
look identical to my eye.
Liz
On 09 Mar 2023 19:28, Peter wrote:
> I have attached two delivered libraries with sample data containing employee name and ID
number. Nothing else.
>
> I'm hoping someone has time to open each with a hex editor to let me know if they can see
sensitive information. I tried but saw nothing other than the names, but I don't know much
about hacking.
>
> Int.ldl
> has a dynarray with three elements in the format
> var dynint dynarray[]smallint
>
> dynInt["Jack"] = 99
> dynInt["Jill"] = 5
> dynInt["Sam"] = 105
>
> The names can be seen but can the smallint value be seen?
>
>
> Str.ldl
> var dynname dynarray[]string
>
> dynName[99] = "Jack"
> dynName[5] = "Jill"
> dynName[105] = "Sam"
>
> Again, the names can be seen but can the elements be seen?
|