Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon.

Pages: 1-

Quines

Name: Anonymous 2018-08-09 1:10

How the fuck do you make a quine?

A quine is a program whose only output is the quine's source code in its entirety.

I guess you could just make the quine read its source from the file itself, but that almost feels like cheating. Surely there are other ways, right?

Name: Anonymous 2018-08-09 2:29

Name: Anonymous 2018-08-10 6:28

1. learn japanese
2. read 'the world of obfuscated, esoteric, artistic programming'
3. ???
4. https://github.com/mame/quine-relay

Name: Anonymous 2018-08-11 3:25

Just write a program that prints the content of a text file, then point it at it's source code. There are other ways but they're generally less language agnostic

Name: Anonymous 2018-08-13 6:51

>>4
that's considered cheating though, the point is to structure the code in such a way that it output is algorithmically the same as its source. that's the point of the puzzle

Name: Anonymous 2018-08-13 18:48

>>5
STRUCTURE MY ANUS

Name: Anonymous 2018-08-13 20:22

>>6
the human centipede is a linked list

Name: Anonymous 2018-08-13 22:00

>>7
How does it smell?

Name: Anonymous 2018-08-13 22:04

>>8
Just like my dog Haskell, who has no nose.

Terrible!

Name: Anonymous 2018-08-15 1:12

>>5
I suppose you could try in reverse, and use whatever output you get as source
you may find code comments useful

Name: Anonymous 2018-08-15 7:36

you can make a quine in literally zero bytes, that's how easy it is

Name: Anonymous 2018-08-15 7:51

>>11
Very funny.
It has to be a non-zero size program, you pedant. You know what I meant.

Of course, the issue of nothing being valid reminds me of a problem with Intel AMT authentication bypassing by using Tamper Data to send a null response hash, because it would only compare the number of characters of the response hash to the valid hash that the user provided. For example, if the user provided a 10-character response hash, it would compare that to 10 characters of the real password hash. But if you edited the data your browser was sending (using Tamper Data or some other similar tool), you could send nothing, so it would compare a null hash to 0 characters of the real hash, and null == null so it would evaluate to true and you would be given access to the web interface for controlling the server.

It was patched, but edge cases are important to test again.

Don't change these.
Name: Email:
Entire Thread Thread List