in reply to YAJAPH - Yet Another JAPH
It's a decent attempt especially for a first time ;-)
I took some pleasure in decyphering your code to derive at the spoiler. You've used a number of interesting tricks to obfuscate the code.
Some of the discovered obfuscation tricks:
For the simplified version of the JAPH look below:
update: Front-paged this one as I felt it deserves it.
_____________________
"We've all heard that a million monkeys banging on a million typewriters will eventually reproduce
the entire works of Shakespeare. Now, thanks to the Internet, we know this is not true."
I took some pleasure in decyphering your code to derive at the spoiler. You've used a number of interesting tricks to obfuscate the code.
Some of the discovered obfuscation tricks:
1. use of => in place of ; 2. use of non standard delimiters in search and replace regexp (s///) 3. Hiding $_ and __DATA__ input handle behind the *_ typeglob. 4. Using left shift bitwise operation to calculate N/2 (e.g. N >> 1 instead of just N/2). 5. and some other ;-) |
For the simplified version of the JAPH look below:
|
update: Front-paged this one as I felt it deserves it.
_____________________
"We've all heard that a million monkeys banging on a million typewriters will eventually reproduce
the entire works of Shakespeare. Now, thanks to the Internet, we know this is not true."
Robert Wilensky, University of California
|
---|
In Section
Obfuscated Code