Q&A for professional and enthusiast programmers. The form html and submit event is part of the 'renderer'. The submitted data should be available in the main process. How to Encrypt Your Email. Even if you never email sensitive information- -social security numbers, banking info, business secrets, and so on- -you should consider.
No, there is no decoding method for P-coded functions. You can use the debugger to step through the code line by line, inspect changes to variables and get a list of called functions. But you cannot get the source code as clear text. And most likely: You are explicitly not wanted to! A decompilation or reverse-engineering of a program usually conflicts with the license conditions and is illegal. EDITED This thread seems to show, that P-coding is less cryptic than I thought: EDITED 2 Modern Matlab versions prevent the debugging of P-files.
@Jan: Jan, I think you missed my point. I already said that the encryption was put in place on purpose to protect intellectual property, which is what I like.
I meant to say that hacking P-code is possible but probably very difficult. I probably had a smirk on my face when I say 'hey, if you find a way, please let me know!' I didn't know hacking P-code is not a real challenge and I still believe it is going to be very hard. Are you afraid that math98 will take my word for it and go cracking the encryption? He said he 'heard from an old MATLAB user that there are some ways to decrypt a pcode'. Is that 'old MATLAB user' referring to you? Walter didn't want to take that credit.
@Yair: Sorry. I did not meant the term 'hacking' in any offending way and I'm definitely convinced from all I've seen and heared in the last years, that your work is legal and helpful for Matlab users and in consequence for TMW. I'm used to distinguish the illegal 'cracking' from the legal 'hacking', which means digging in the codes for the not barely obvious features. If any of your investigations and publications of the golden beans you've found is not legal -what is not the case!-, I'd strongly recommend that you get payed by TMW to catch up a legalization retrospectively. Anyhow, Yair, I've deleted the concerning comment, because I know that the term 'hacking' might be misunderstood.
No, there is no decoding method for P-coded functions. You can use the debugger to step through the code line by line, inspect changes to variables and get a list of called functions. But you cannot get the source code as clear text. And most likely: You are explicitly not wanted to! A decompilation or reverse-engineering of a program usually conflicts with the license conditions and is illegal.
EDITED This thread seems to show, that P-coding is less cryptic than I thought: EDITED 2 Modern Matlab versions prevent the debugging of P-files. @Jan: Jan, I think you missed my point. I already said that the encryption was put in place on purpose to protect intellectual property, which is what I like. I meant to say that hacking P-code is possible but probably very difficult. I probably had a smirk on my face when I say 'hey, if you find a way, please let me know!' I didn't know hacking P-code is not a real challenge and I still believe it is going to be very hard.
Are you afraid that math98 will take my word for it and go cracking the encryption? He said he 'heard from an old MATLAB user that there are some ways to decrypt a pcode'.
Is that 'old MATLAB user' referring to you? Walter didn't want to take that credit. @Yair: Sorry. I did not meant the term 'hacking' in any offending way and I'm definitely convinced from all I've seen and heared in the last years, that your work is legal and helpful for Matlab users and in consequence for TMW. I'm used to distinguish the illegal 'cracking' from the legal 'hacking', which means digging in the codes for the not barely obvious features.
If any of your investigations and publications of the golden beans you've found is not legal -what is not the case!-, I'd strongly recommend that you get payed by TMW to catch up a legalization retrospectively. Anyhow, Yair, I've deleted the concerning comment, because I know that the term 'hacking' might be misunderstood.