If you use some GPL code and then don't share your code, is there anyway they can find out?? This is about a turn-based strategy game btw if that matters.
Name:
Anonymous2009-09-05 14:05
is there anyway they can find out
Given the large amount of code that has been open-sourced as a result of trying to steal GPL'ed code and getting found out (like the Microsoft Hypervisor stuff), I think it's obvious that there is.
>>1
Yes. Nobody ever chooses willingly to apply the GPL to their project: they are only forced to do so because they depend on another GPL'd project. Maybe someday we will break free from this vicious circle, but in the meantime, don't be the next victim.
Name:
Anonymous2009-09-05 18:09
>>11
Hi Steve BallmerPlease don't throw a chair at me
Name:
Anonymous2009-09-05 18:17
How can anyone know you stole code if they can't see it?!
>>15
that's because you don't actually write any code. you just take code that other people released as free software and make it anti-free.
Name:
152009-09-05 23:35
>>16
I don't understand what you mean. You can choose to believe whether or not I actually have written and published software. All I can do is assert that I publish all my software under the GPL.
Name:
Anonymous2009-09-06 2:55
As the infamous MrVacBob discovered, Ico violated the GPL1. If I ever become rich, I think I will sue them for all the Ico source code.
>>20 By very little effort you mean sifting through 30+ megabyte disassembles hoping they are not packed or encrypted?
________________________________________________ http://bayimg.com/image/aadbjaace.jpg
Velox Et Astrum gamedev forum: http://etastrum.phpbb3now.com
My Blog: http://frozenvoid.blogspot.com/
«Bureaucracy destroys initiative. There is little that bureaucrats hate more than innovation, especially innovation that produces better results than the old routines. Improvements always make those at the top of the heap look inept.»
>>21
It's doable in minutes. Real reverse engineers know their tools. One hint: F.L.I.R.T..
As for packing/encryption, you have to remove any before starting reverse engineering your code, but anybody worth a dime knows that. Inb4 back to /rechan/.
You don't even know what you're talking about. Dynamic linking is one thing and easy to understand without needed ANY tools, any PE editor will tell you what it imports, or you could just look at it in a hex editor and find the same. Static linking causes the code to be inlined, and to identify it, you'll need to detect code pattern, which is non-trivial, but doable, that's what FLIRT does.
You only have to share the source code if you distribute the program, but I don't see how they'd find out in the first place.
I don't agree with you dong it but I don't really care either.
>>31
There are things which are "right" and "wrong" but only because of the consequences they produce. There is a universal right and wrong to the same extent that there is a universal up and down (that is, not at all).
Don't use GPL licensed software, use BSD licensed software. Stallman is a silly old man.
Name:
Anonymous2012-06-28 10:35
>>35 Stallman is a silly old man.
But he makes a ton of money in GPL violation lawsuits. Many Jews look stupid, like Ballmer with his famous "Developers", but then again they are indecently rich. That is: what looks stupid for you, makes them billions.
Name:
Anonymous2012-06-28 10:39
>>35
Someone calling Stallman silly looks like an assembly programmer calling C# programmer silly, or like a unicellular organism calling mammals silly, for using so much energy in so inefficient way.
FSF Board of Directors
Hal Abelson, LISP
Geoffery Knauth, LISP
Henry Poole, moot's relative?
Richard Stallman, LISP
Gerald Jay Sussman, LISP, third lurker of /prog/
Benjamin Mako Hill, dunno
Bradley Kuhn, dunno
Name:
Anonymous2012-06-28 11:08
>>14
He can obfuscate it and there is such a thing as trusted computing, which will disallow any reversing.
Name:
Anonymous2012-06-28 11:10
>>17
There is big difference between school project and a useful software. And no, savegame editor for Diablo 3 isnt useful software.
People do it all the time. Someone has to be really good at reading ASM to be caught. Unless you're using some semi-interpreted language like Java where any idiot can extract the source files. Then you're fucked and will be found out in a matter of time.