HydroMail V0.4.2 [It's Back!]
doublequestionmark 25 Jun 2015
HydroMail
powered by bedrock
What Is HydroMail
Spoiler
Features
Spoiler
Bugs (not the bunny)
Spoiler
Where can i get such an amazing program?
Spoiler
how do i create an account?
Spoiler
how do I send emails to real email accounts (ex: gmail)?
Spoiler
Screenshots
Spoiler
P.S. once you create an account, you should post it here. that way anyone can email youmine is Trey
Edited by doublequestionmark, 15 September 2015 - 09:09 PM.
SpencerBeige 25 Jun 2015
i was actually kind of hoping for bugs (yes the bunny)
but it is a cool system. nice work.
but it is a cool system. nice work.
Cranium 25 Jun 2015
Any particular reason this is in bytecode?
In the past, most people only do this to hide malicious intents.
In the past, most people only do this to hide malicious intents.
MKlegoman357 25 Jun 2015
If the reason is to 'hide' the source code so it would be harder for hackers to hack your program then keep in mind that turning Lua bytecode back to Lua source is very easy. You shouldn't be worrying about the client side protection anyways, it's the server side that must be secured and prepared for invalid input.
LDDestroier 25 Jun 2015
I ran it on an advanced computer in LurCraft, and it gave me this error:
I'll look at the code to see a problem. In the meantime, fiiiiiiiixx iiiitttt!!
...umm, I can't read bytecode.
Edited by LDDestroier, 25 June 2015 - 04:32 PM.
bios:14: [string "a4RndyaN"]:2 nesting of [[...]] is deprecated
I'll look at the code to see a problem. In the meantime, fiiiiiiiixx iiiitttt!!
...umm, I can't read bytecode.
Edited by LDDestroier, 25 June 2015 - 04:32 PM.
Lyqyd 25 Jun 2015
Downloads removed. Obfuscated installers serve only to hide malicious code within them and are not allowed. Please replace the installer with a clear text version.
TheOddByte 25 Jun 2015
What's the reason that you used bytecode? It's clearly not the option when posting something here on the forums, as it's stated by the comments above.
And how do you store the passwords on your server? Are you using salts? Is it hashed before it sends it to the webserver?
Security is important and we'd love some more information about the program if we're going to use it.
One final thing, please post some screenshots of the program, as it tends to attract more people to use your program.
And how do you store the passwords on your server? Are you using salts? Is it hashed before it sends it to the webserver?
Security is important and we'd love some more information about the program if we're going to use it.
One final thing, please post some screenshots of the program, as it tends to attract more people to use your program.
Dahknee 25 Jun 2015
Either they want to be cool or they are doing something else with them messages...
doublequestionmark 25 Jun 2015
I used bytecode because I didn't really feel comfortable with giving everyone the format for making calls to the php script, because someone may try to abuse it.
I'll post an installer later for the normal code, if that is what I have to do
I'll post an installer later for the normal code, if that is what I have to do
Dahknee 25 Jun 2015
doublequestionmark, on 25 June 2015 - 09:18 PM, said:
I used bytecode because I didn't really feel comfortable with giving everyone the format for making calls to the php script, because someone may try to abuse it.
I'll post an installer later for the normal code, if that is what I have to do
I'll post an installer later for the normal code, if that is what I have to do
That is why you use santising scripts like my app store does to stop them from breaking or misusing anything!
MKlegoman357 25 Jun 2015
When writing a program which access the internet and that is public then it doesn't matter in what language it was written or in what environment it is running, people can easily find out the server and the PHP calls. Like I already mentioned you have to protect the server itself, you may even consider your own client to be malicious to your own server just because it can send messages to it. BTW, how are you securing the passwords?
TheOddByte 25 Jun 2015
doublequestionmark 25 Jun 2015
ok i published the uncompiled program, please dont abuse it (i mean that in more ways than one...)
Geforce Fan 26 Jun 2015
Dahknee 26 Jun 2015
doublequestionmark, on 25 June 2015 - 11:41 PM, said:
ok i published the uncompiled program, please dont abuse it (i mean that in more ways than one...)
In all honesty if you do not want anyone to abuse it set up a way to stop it via IP logging and blocking if they do a request more than 2 times a second, orrrrrr don't post it. Most people can handle it but I have a huge API on my server and people have attempted to abuse it so I set up ways of stopping it.
But yeah it's all up to you, but if you really have trust issues, don't post it...
doublequestionmark 26 Jun 2015
yea i understand, but when someone creates this username: ' DROP TABLE users; its a bit concerning.
luckily i had some sql injection protection
luckily i had some sql injection protection
Dahknee 26 Jun 2015
Yeah well it is probably someone reading what we are putting and trying it xD