
You are missing trading opportunities:
- Free trading apps
- Over 8,000 signals for copying
- Economic news for exploring financial markets
Registration
Log in
You agree to website policy and terms of use
If you do not have an account, please register
You don't have to worry about that, the encrypted one you sent in error has not started to be encrypted.
Also, don't worry about the test service itself, as it is temporary and its only purpose is to allow external access to test the beta version of the encryption algorithm. It's a far cry from the final product.
), logically, because a machine is not someone, a machine is something, so no one has encrypted or even started )
it took a whole hour for the machine to beat it)
), it is logical, because a machine is not someone, a machine is something, so no one encrypted or even started )
It took me an hour to get the car.)
Message about the inability to process the application is always sent in an hour from the time of reading the application, if the application has not been processed.
We established the reason, as you correctly noted"stupidly sent them the same encrypted source code.
So do not worry about the car
The message that the application cannot be processed is always sent an hour after it has been read, if the application has not been processed.
You and I have established the reason, as you correctly noted"foolishly sent them their own encrypted source code".
So do not worry about the machine.
), but why did it encrypt a piece of encrypted code?
zy:
ah, sorry, that's the same source code I attached.
but still, making the user wait for an hour is not right, considering the machine instantly recognised that the user had made a mistake.
well, sending the user the source without checking it for compilation errors isn't right either )
), and what did it encrypt a piece of encrypted code for?
Alexander, please explain your question.
As far as I understand you have sent three applications: two applications with correct unencrypted code (these applications were processed and you received the files), one application"stupidly sent them their own encrypted source" (in response to this application you received a message without a file that this application was not processed)
Alexander, please explain your question.
As far as I understand you have sent three applications: two applications with correct unencrypted code (these applications were processed and you received the files), one application"stupid lysent them their own encrypted source" (in response to this application you received a message without a file that this application was not processed)
), and what does it encrypt a piece of encrypted code for?
zy:
ah, sorry, that's the source code I attached.
but still, making the user wait an hour is not right, considering the machine instantly recognised the user made a mistake.
well, sending the user the source without checking it for compilation errors isn't right either )
and yet, no, the machine did start doing something.
what I sent.
what came (I had to cut off the ends to fit the message size)
I received an email with the source that I sent earlier (encrypted), but not the trailer, but the text in the body of the email
You can weigh whomever and however you like, I am even willing to be weightless, only your curiosity has nothing to do with the aims and objectives for which the topic of this thread was created.
In that case (if forumers are not allowed to be curious about anything, and only you are allowed), the topic of the thread is incomprehensible at all. Something is being discussed that is not ready, on which no questions can be asked. As soon as there is a request for confirmation of your own words, you start looking for pretexts like this. In the end, it just comes out as a shake of the air.
Regarding "never say never", in our experience some of the most highly skilled programmers are usually among the hacking experts.
Thank you for taking me for a highly skilled professional ))))
But once again: no matter how highly qualified I am, it won't affect my beliefs about destructive actions - knowingly and in my right mind, I won't do them.
For that reason, one should not underestimate their capabilities at all, as what is created by one person tends to be broken by another.
Perhaps you still haven't realized how elementary the problem of hacking is? The developer does not need to be a master of ceramics and there is no need for such bicycles.
In that case (if forum members are not allowed to be interested in anything, and only you are allowed), the topic of the thread is not understandable at all. You are discussing something which is not ready and on which you are not allowed to ask questions. As soon as there is a request for confirmation of your own words, you start looking for excuses like this. In the end it just comes out of thin air.
Thank you for taking me for a highly qualified professional ))))
But once again: no matter how great my qualifications are, it will not affect my beliefs about destructive actions - I will not do them consciously and in my right mind.
Perhaps you still haven't realised how elementary the problem of hacking is? The developer does not need to be a genius in the head and there is no need for such bicycles.