Jump to content




HydroMail V0.4.2 [It's Back!]


26 replies to this topic

#1 doublequestionmark

  • Members
  • 118 posts
  • LocationI honestly don't know

Posted 25 June 2015 - 03:23 AM

HydroMail

powered by bedrock


What Is HydroMail
Spoiler

Features
Spoiler

Bugs (not the bunny)
Spoiler

Where can i get such an amazing program?
Spoiler

how do i create an account?

how do I send emails to real email accounts (ex: gmail)?
Spoiler

Screenshots
Spoiler
P.S. once you create an account, you should post it here. that way anyone can email you
mine is Trey

Edited by doublequestionmark, 15 September 2015 - 09:09 PM.


#2 SpencerBeige

  • Members
  • 263 posts

Posted 25 June 2015 - 03:25 AM

i was actually kind of hoping for bugs (yes the bunny)

but it is a cool system. nice work.

#3 Creator

    Mad Dash Victor

  • Members
  • 2,168 posts
  • LocationYou will never find me, muhahahahahaha

Posted 25 June 2015 - 08:04 AM

guess, my account name?

Creator

#4 Cranium

    Ninja Scripter

  • Moderators
  • 4,031 posts
  • LocationLincoln, Nebraska

Posted 25 June 2015 - 02:00 PM

Any particular reason this is in bytecode?
In the past, most people only do this to hide malicious intents.

#5 MKlegoman357

  • Members
  • 1,170 posts
  • LocationKaunas, Lithuania

Posted 25 June 2015 - 04:13 PM

If the reason is to 'hide' the source code so it would be harder for hackers to hack your program then keep in mind that turning Lua bytecode back to Lua source is very easy. You shouldn't be worrying about the client side protection anyways, it's the server side that must be secured and prepared for invalid input.

#6 LDDestroier

  • Members
  • 1,094 posts
  • LocationACDC Town

Posted 25 June 2015 - 04:31 PM

I ran it on an advanced computer in LurCraft, and it gave me this error:
bios:14: [string "a4RndyaN"]:2 nesting of [[...]] is deprecated

I'll look at the code to see a problem. In the meantime, fiiiiiiiixx iiiitttt!!

...umm, I can't read bytecode.

Edited by LDDestroier, 25 June 2015 - 04:32 PM.


#7 Lyqyd

    Lua Liquidator

  • Moderators
  • 8,459 posts

Posted 25 June 2015 - 04:43 PM

Downloads removed. Obfuscated installers serve only to hide malicious code within them and are not allowed. Please replace the installer with a clear text version.

#8 TheOddByte

    Lazy Coder

  • Members
  • 1,607 posts
  • LocationSweden

Posted 25 June 2015 - 05:40 PM

What's the reason that you used bytecode? It's clearly not the option when posting something here on the forums, as it's stated by the comments above.
And how do you store the passwords on your server? Are you using salts? Is it hashed before it sends it to the webserver?
Security is important and we'd love some more information about the program if we're going to use it.

One final thing, please post some screenshots of the program, as it tends to attract more people to use your program.

#9 DannySMc

  • Members
  • 1,808 posts
  • Location/home/dannysmc95

Posted 25 June 2015 - 07:02 PM

Either they want to be cool or they are doing something else with them messages...

#10 doublequestionmark

  • Members
  • 118 posts
  • LocationI honestly don't know

Posted 25 June 2015 - 09:18 PM

I used bytecode because I didn't really feel comfortable with giving everyone the format for making calls to the php script, because someone may try to abuse it.
I'll post an installer later for the normal code, if that is what I have to do

#11 DannySMc

  • Members
  • 1,808 posts
  • Location/home/dannysmc95

Posted 25 June 2015 - 09:35 PM

View Postdoublequestionmark, on 25 June 2015 - 09:18 PM, said:

I used bytecode because I didn't really feel comfortable with giving everyone the format for making calls to the php script, because someone may try to abuse it.
I'll post an installer later for the normal code, if that is what I have to do

That is why you use santising scripts like my app store does to stop them from breaking or misusing anything!

#12 MKlegoman357

  • Members
  • 1,170 posts
  • LocationKaunas, Lithuania

Posted 25 June 2015 - 09:37 PM

When writing a program which access the internet and that is public then it doesn't matter in what language it was written or in what environment it is running, people can easily find out the server and the PHP calls. Like I already mentioned you have to protect the server itself, you may even consider your own client to be malicious to your own server just because it can send messages to it. BTW, how are you securing the passwords?

#13 TheOddByte

    Lazy Coder

  • Members
  • 1,607 posts
  • LocationSweden

Posted 25 June 2015 - 09:40 PM

View PostMKlegoman357, on 25 June 2015 - 09:37 PM, said:

- snip -
I totally agree with you there, it's the server who should protect against any "malicious" business or whatever.
And as he mentioned in the first post, he's using SHA256 hashing, he wasn't more specific than that.

#14 doublequestionmark

  • Members
  • 118 posts
  • LocationI honestly don't know

Posted 25 June 2015 - 11:41 PM

ok i published the uncompiled program, please dont abuse it (i mean that in more ways than one...)

#15 Geforce Fan

  • Members
  • 846 posts
  • LocationMissouri, United States, America, Earth, Solar System, Milky Way, Universe 42B, Life Street, Multiverse, 4th Dimension

Posted 26 June 2015 - 04:21 AM

View Postdoublequestionmark, on 25 June 2015 - 11:41 PM, said:

ok i published the uncompiled program, please dont abuse it (i mean that in more ways than one...)
how could they abuse it?
And how have you compiled something?

#16 DannySMc

  • Members
  • 1,808 posts
  • Location/home/dannysmc95

Posted 26 June 2015 - 07:57 AM

View Postdoublequestionmark, on 25 June 2015 - 11:41 PM, said:

ok i published the uncompiled program, please dont abuse it (i mean that in more ways than one...)

In all honesty if you do not want anyone to abuse it set up a way to stop it via IP logging and blocking if they do a request more than 2 times a second, orrrrrr don't post it. Most people can handle it but I have a huge API on my server and people have attempted to abuse it so I set up ways of stopping it.

But yeah it's all up to you, but if you really have trust issues, don't post it...

#17 doublequestionmark

  • Members
  • 118 posts
  • LocationI honestly don't know

Posted 26 June 2015 - 07:04 PM

yea i understand, but when someone creates this username: ' DROP TABLE users; its a bit concerning.
luckily i had some sql injection protection :D

#18 DannySMc

  • Members
  • 1,808 posts
  • Location/home/dannysmc95

Posted 26 June 2015 - 09:21 PM

Yeah well it is probably someone reading what we are putting and trying it xD

#19 Creator

    Mad Dash Victor

  • Members
  • 2,168 posts
  • LocationYou will never find me, muhahahahahaha

Posted 26 June 2015 - 09:24 PM

That'd be ironical!

#20 DannySMc

  • Members
  • 1,808 posts
  • Location/home/dannysmc95

Posted 26 June 2015 - 10:30 PM

View PostCreator, on 26 June 2015 - 09:24 PM, said:

That'd be ironical!

Pretty much!





1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users