Python Obfuscate String

gradle file: release { minifyEnabled true proguardFiles getDefaultProguardFile("proguard-android. any character except newline \w \d \s: word, digit, whitespace. You can use the compile function and the marshal module to compile Python code into code objects, and convert such code objects to binary strings. A simple python tool to help you to social engineer, bypass whitelisting firewalls, potentially break regex rules for command line logging looking for IP addresses and obfuscate cleartext strings to C2 locations within the payload. I need the code in C#. It is common that Python programs are delivered in source code, but in some cases different techniques like obfuscation and compilation are applied to protect the code from curious eyes. You can then use the keystore to load your key manager and trust manager that can be used to initialize an SSL context that is used for all connections. apply_obfuscation(source) [source] ¶ Returns 'source' all obfuscated. Python is eating the world: How one developer's side project became the hottest programming language on the planet. Without using IDA, a handy Python project for binary analysis is Vivisect. Line breaks may be encoded by "\r\n" or "\r", even mixed. NET On all things. It's a style guide for Python that lots of Python developers follow. Apart from reverse cipher, it is quite possible to encrypt a message in Python via substitution and Caesar shift cipher. Multiply with the number of Python programmers that want to migrate and you get a problem. py - The main module for minifying, obfuscating, and compressing Python code¶. The java substring() method of String class is used for getting a substring from the string. Source Map. [2] Some anti-virus software, such as AVG, will also alert their users when they land on a site with code that is manually obfuscated, as one of the purposes of obfuscation can be to hide malicious code. Gcat is a stealthy Python backdoor that uses Gmail as a command and control server. You can configure your logging system in Python code, but then you need to modify your code whenever you want to change the log configuration. To properly demonstrate the effectiveness of each minification, obfuscation, and compression method we’ll minify the pyminifier. I like a package called pyobfuscate. You can optionally pass the filter an argument that will be used as the email link text (otherwise it will simply use the email address itself). Different from other obfuscators, which often use a (reversible) eval() based obfuscation, this tool actually parses PHP, and obfuscates variable names, methods, etc. You begin to fall down a hole though; should we obfuscated __builtins__ too?. •C++ strings (string objects), which is part of the standard C++ library. Indeed, all the strings used by this malware are obfuscated or encrypted. Obfuscate co_code of each function (code object) in runtime. Quick start guide. The next task is to identify each time the string decoder function is called and all of the arguments to each call. Using AES for Encryption and Decryption in Python Pycrypto We now create the AES cipher and use it for encrypting a string (or a set of bytes; the data need not. Python Configuration File. py code itself. You can exclude human readable configuration files containing Python code. The purpose of obfuscators in general is to hide program code, flow, and functionality. OK, I Understand. Examples of said strings would be malicious URLs or registry keys. 1 Obfuscation Measurement and Assessment Obfuscation techniques have been widely used in the Android app development. > - for larger strings we could use Paul's algorithm but limit the XOR op to the first and last 16 elements instead of all elements. If your entire business rests on the IP embodied in your software or you don't want your C# or VB. Finally, there is the value string-array-threshold , which affects the paging probability of strings. with __getattr__ and friends). I'm trying to figure out which approach I should use to encrypt the data. NET framework (1. ico and iOS / Android App Icons. This code below I would like to obfuscate it,sender and password i. This allows us to type ASCII character values instead of the actual characters themselves. Properly obfuscated C or C++ source code can be compiled by any compiler. com/subscribe/ *** 🐍 Cheating in Python? Of. Introduction to IDAPython Byoungyoung Lee POSTECH PLUS 038 [email protected] Freedom is one of the main benefits of the Python community. However, if I did need to obfuscate Python code, I'd probably use the same techniques you'd use for a program in any language. Most files contain an explanatory text file appended to the ANSI C code. Can someone pls help ? Thanks · Hi, Check with, you can change these static. Original string: This is a test message to prove the concept. OK, I Understand. ico and iOS / Android App Icons. Opy will obfuscate your extensive, real world, multi module Python source code for free! You can use Opy on Python 2 or 3! And YOU choose per project what to obfuscate and what not, by defining unique configuration: You can recursively exclude all identifiers of certain modules from obfuscation. URLs are strings of text that identify web resources such as websites or any kind of Internet server, so an obfuscated URL shows up as a meaningless query string to users. - Use of a package wasn't to impress the judges (although using a different namespace was :-). Obfuscated C Code Unless otherwise indicated, the code comes from the International Obfuscated C code contest. defined by your code. You might want to call it something like databaseconfig. Brownstone hit the nail right on the head. Convert to binary and convert back to strings. Download a free, fully functional evaluation version today. One is obfuscation. myObfuscator is an object that obfuscates text, ignoring line breaks (would be replaced by any other character). Without using IDA, a handy Python project for binary analysis is Vivisect. and TIBCO affiliates (collectively “TIBCO”) need to collect your email ID. The purpose of obfuscators in general is to hide program code, flow, and functionality. You begin to fall down a hole though; should we obfuscated __builtins__ too?. he's grinning the army beyond dorogobuzh while with those orders as having wrung a pleasant comforting and asked petya. In this connection string I have to include the username and password for this connection. Now, I want to release a product of my own (a comprehensive CMS on top of flask, but using a modular architecture is in development). If we look back, we recall that before each call to the de-obfuscation function, there was a 'push offset' call, like so:. I’ll be looking at how H1N1 has evolved, its obfuscation, analyzing its execution including new information stealing and user account control bypass capabilities, and finally exploring. This allows us to type ASCII character values instead of the actual characters themselves. Obviously, obfuscation isn't a foolproof method (what is?) but it does make the process a little more difficult. txt"), "proguard-rules. Decode, Encode or Obfuscate your string This is used to obfuscate your string or code, to encode or decode a certain value. Python String Operations. py, It's a little python script who will open a new port on server SimpleHTTPServer ( python ) module. When HTML is obfuscated, spam robots are. Feature wise it doesn’t. 1 of the Python reference manual). These will do it automatically and won't cost you a penny!. Invoke-Obfuscation. I need to obfuscate lines of Unicode text to slow down those who may want to extract them. NET obfuscation products. Brownstone hit the nail right on the head. Obfuscate Html Software Downloads pyfuscate is a tool to obfuscate Python source code provides a fast, intuitive way to obfuscate your PHP source like script expiration or binding script to the Php Script : Database programming with php and mysql PrimalScript is the universal script editor for VBScript, PHP , Windows PowerShell, ASP, Python. The easiest method for this using python is to use the find method, or in this case rfind, so you can look for the last space to pull out the last name. From the name ‘-minifier’, it doesn’t just minify your python code. Instead of using the function, we can implement it using hex() and the string_escape codec:. Validating an email means that you're testing whether or not it's a properly formatted email. And an HTTP/S proxy which automatically obfuscates-encrypts-signs all requests for Python code wouldn't be so difficult, using only covertutils as a dependency. Simply writing two string literals together also. This is the wrong tool for that. NET (or back again)? No? Well, we've got just the tools for you. Our obfuscator does not inherently store all the strings. I'm trying to devise a scheme to encrypt/obfuscate a short string that basically contains the user's username and record number from the database. Note that the string encryption used by Zelix KlassMaster™ is cumulative. JavaScript Obfuscator Desktop provides all the features you need to scramble and protect JavaScript code. py It means all files anywhere in the src tree matching. Script to rename strings in a binary for obfuscation purposes - CleanBinaryStrings. Well organized and easy to understand Web building tutorials with lots of examples of how to use HTML, CSS, JavaScript, SQL, PHP, Python, Bootstrap, Java and XML. With Pyminifier, you can choose the kind of obfuscation you want. py It means all files anywhere in the src tree matching. Advantages of obfuscation. Hello, So the studio has asked me to protect some code, because they are giving access to external people to it. Scribd is the world's largest social reading and publishing site. The outputted program claims to be a tutorial, and is even formatted nicely!. I'm trying to create two for statements,but only one of them runs >. You begin to fall down a hole though; should we obfuscated __builtins__ too?. Even though each obfuscator has its own format of configuring the transformations, they all support a common set of features. The purpose of obfuscators in general is to hide program code, flow, and functionality. One is obfuscation. We might need to obfuscate them and provide some basic security without writing some. To strip out classes that are not required. The Python Discord. In Python if the target string small & your matching expression is simple use string. The randomness comes from atmospheric noise, which for many purposes is better than the pseudo-random number algorithms typically used in computer programs. Many encryption and compression functions return strings for which the result might contain arbitrary byte values. I'm trying to devise a scheme to encrypt/obfuscate a short string that basically contains the user's username and record number from the database. This is the wrong tool for that. Original string: This is a test message to prove the concept. Ifyou're ready to discover what Google and YouTube see in Python,this book is the best way to get started. Without using IDA, a handy Python project for binary analysis is Vivisect. If a signature is written for the term, http, it can also be written as "h" + "ttp". *I'm using this encrypted string to identify emails from a user. ajax android angular api button c++ class database date dynamic exception file function html http image input java javascript jquery json laravel list mysql object oop ph php phplaravel phpmysql phpphp post python sed select spring sql string text time url view windows wordpress xml. any character except newline \w \d \s: word, digit, whitespace. It’s free! *** Click: https://blog. Oak Vale Networks, Inc. Terminal string styling done right, in Python. py for Package. NET (or back again)? No? Well, we've got just the tools for you. The book has chapters that cover extensively on the subject generators and iteration techniques. Lambda expressions are a special syntax in Python for creating anonymous functions. You can configure your logging system in Python code, but then you need to modify your code whenever you want to change the log configuration. Obfuscation on spring applications requires a correct configuration which may not be very easy to set up. Skip to content. Convert a byte array to a string with VB. A simple python tool to help you to social engineer, bypass whitelisting firewalls, potentially break regex rules for command line logging looking for IP addresses and obfuscate cleartext strings to C2 locations within the payload. Outputs Python source code for maximum flexibility. Original string: This is a test message to prove the concept. This includes sensitive integers, like numeric passwords or. ow obfuscation Data ow obfuscation Python obfuscation What is obfuscation ? Code obfuscation De nition Obfuscation is used to make code analysis as complex and expensive as possible, while keeping the original behaviour of the program (input/output equivalence). Line breaks may be encoded by "\r " or "\r", even mixed. The version argument is optional; if given, the resulting UUID will have its variant and version number set according to RFC 4122, overriding bits in the given hex, bytes, bytes_le, fields, or int. 2 - Updated Aug 22, A Python module that implements the Brew edit distance algorithm. Sourceguardian - Obfuscation And Encryption is a multi-platform compatible script that allows you to protect your source code in four very powerful ways: Encrypt it, Obfuscate it, Time Limit (for trialware) and IP limit (so it only runs on one IP address). * range() and list/string indices have inconsistent/confusing semantics. A tool used to obfuscate python scripts. OK, I Understand. This is less effective than the previous example, since you are not trashing any vital information, but it still can't hurt to do it, right? Let's take our obfuscated code again and let's kill the formatting:. I was asked to find a way to obfuscate Python code so that our customer couldn’t simply just open up the Python files and look at the code inside. These little '+' can mess up with our regexp, so they have to be handled first; Char type projection - sometimes for additional obfuscation, strings to be replaced are not typed directly to the powershell code, but they are converted from int to char. warning user string stdiomask read python password off obfuscate may Masking user input in python with asterisks I am trying to mask what the user types into IDLE with asterisks so people around them can't see what they're typing/have typed in. Expert Ajay Kumar revisits the topic of data obfuscation techniques and explores the architectures, approaches and best practices for protecting enterprise data. On parle aussi d'assombrissement destiné à rendre le code impénétrable. I decided to write up an explanation of how the hell it works. Substring in Java. So, the other day, when faced with a very common situation I tried a functional solution. This tool uses the mcrypt_encrypt() function in PHP, so for more infos about the parameters used check the manual. * range() and list/string indices have inconsistent/confusing semantics. For instance, we can change the name of the functions to a random text string. It would also work with httpimport out-of-the-box! Wouldn’t it be elegant…. This is a program that helps the users to. In the AST, constant String nodes are represented with Str nodes. This blog is the first in a 3 part series that will provide an in-depth technical analysis on the H1N1 malware. It's a 100% safe Java Script minifier and the best JavaScript compressor in the web. Obfuscation of C and C++ is controllable by a lot of options. Outputs Python source code for maximum flexibility. [Maven Obfuscation]Using yguard Obfuscate classes plus string references. I mean: once I obfuscated the exe file for the first time, I copied it to his project folder to test it in his context. A Brainf*ck interpreter. as emulator detection, application icon hiding, reflection etc. Behind each exploit there is a history of creativity and incredible knowledge. CrunchCode – the obfuscator for Excel–VBA. Are there any good obfuscation options in Python? I'm a freelance developer and for the most part, I've coded in Python (mostly flask and sqlalchemy, and some projects using other libraries). file decode-str. Telit’s Easy Script Extension functionality includes a Python interpreter supporting Python version 1. – Security List Network™. Obfuscation Software Informer. These will do it automatically and won't cost you a penny!. The data format used by pickle is Python-specific. Note: this method will not change the original array. NET protection tool to secure. r/Python: news about the dynamic, interpreted, interactive, object-oriented, extensible programming language Python Press J to jump to the feed. Include it in update statements against string columns. It protects Python scripts by the following ways: Obfuscate code object to protect constants and literal strings. 7 are supported. VBA–Code statistics; all identifiers with original names and camouflaged names. The original attributes used for the Namespace declarations. The malware author used the function StrReverse which is a built-in VBA function to reverse a given string. OK, I Understand. Obfuscation on spring applications requires a correct configuration which may not be very easy to set up. There are a few different ways payloads can be delivered through Microsoft Office documents, including macros, OLE embedding, Addins, Actions and DDE. Unfortunately, the procurement of the values is then between 30 and 50 percent slower. Online VBScript Obfuscator/Defuscator (Encrypt/Protect VBS) Using this handy VBS tool, you can convert your VBScript into an obfuscated VBS source code, without compromising/altering the scripting functionalities and the VBScript keywords. How to display an image. This JS begins with a massive array of hex strings I changed the name of the array, formatted the hex (removed '\x'), and wrote a few lines of python to loop through the array for decoding. 7, you can load logging configuration from a dict. It provides an opportunity generate any data and in any quantity. Listing 1: Simple string obfuscation example using the XOR operation. with __getattr__ and friends). You can also save this page to your account. In this case, I tried to patch missing holes, replace variable substituations, remove concatenation and hack together replacements for undefined functions in the script to figure out what it was attempting to do. * Lots of ugly workarounds for the same problem. ? The only difference in the second for statement is "Username" and "username" changed to "Password" and. Apparently NZBGet does this automatically so is the solution to just switch clients?. Rather, the package provided the ability to deobfuscate the string in a different interp than the one that had obfuscated it in the first place. replace(), if the target string is much larger then use RegEx uncompiled. Change the data length as you see fit. Date: October 2012 → Perl is in my heart (or vice versa). Python dictionary method values() returns a list of all the values available in a given dictionary. No matter what you do, at some point the Python interpreter is going to be reading in unobfuscated Python byte-code. NET Applications! Confuser is a protector/obfuscator for. For Part 1 of this series, I'm going to walk through a situation where I was able to write a script to thwart multiple instances of string obfuscation witnessed in a malware sample. SDKs, Web API interfaces, libraries and other programming projects provided in source form for C/C++, Java, JavaScript, C#, PHP & Python. Without using IDA, a handy Python project for binary analysis is Vivisect. In this tutorial, I will show you how to convert something readable, to something completely unreadable, but it still works, exactly the same. I don't know of any specific Python obfuscation tools (probably because the kind of people who want to write obfuscated code aren't going to be doing it in Python, except for amusement/education). pdf), Text File (. Free online string utilities such as convert to lowercase, convert to uppercase, word count, character count, string splitter, reverse and more. One of the ways to protect your code is to obfuscate it using base 32 or 64 algorithms to encrypt the code and make it unreadable. obfuscate to return the token string if that token can be safely. RCE: Obfuscation and CommunicationsAdam Meyers - SRA International Significant Work. Numeric strings are numbers that are stored in text columns. Convert a byte array to a string with VB. Example Obfuscation – Strings. Become a Python Developer; and arguments renaming,…strings removal. You can then use the keystore to load your key manager and trust manager that can be used to initialize an SSL context that is used for all connections. Therefore any string can potentially contain a name. You can browse for and follow blogs, read recent entries, see what others are viewing or recommending, and request your own blog. Note that Tkinter doesn't necessary follow those rules, as it's a really old module. NET concepts extensively and it is a good, real life, independent candidate to test with Crypto Obfuscator. out of this, maybe you noticed that some of the variables has no other reference and never been used in other part of the code, just because they are the garbage code that add more obfuscation to its code and make the code analysis more confusing. We will not add this feature for security purposes, doing so encourages people to encode sensitive data, like passwords. py, then dump it as a single string into output. By this I mean running each char of a string through a function which xors the char with some given. Hi, How to encrypt and decrypt a given string using any possible algorithm. Python does not support a character type; these are treated as strings of length one, thus also considered a substring. A function is needed, that obfuscates text but preserves line breaks. Unfortunately, the procurement of the values is then between 30 and 50 percent slower. So the first step we will take will be to encode Scanner. Online Hash Calculator lets you calculate the cryptographic hash value of a string or file. – Security List Network™. 1 with Anaconda on a Windows machine. ''' Did you know? A few hack, cracks and obfuscated examples, which may actually lead to less confusion and a greater knowledge of why things work and how. This is the wrong tool for that. I have a list of Foo objects, each having a Description() method that returns a string. A Python source code obfuscator that uses ROT13. The truth behind why many people are making games in Python is that it is one of the world's fastest-growing languages. I'm trying to figure out which approach I should use to encrypt the data. In the Fall of 2015 I decided to begin researching the flexibility of PowerShell's language and began cataloguing the various ways to accomplish a handful of common techniques that most attackers use on a regular basis. Recommendations to achieve best results. However, if I did need to obfuscate Python code, I'd probably use the same techniques you'd use for a program in any language. An indirect can be used — Referenced — from anywhere else that a normal object (string, integer, etc. If we look back, we recall that before each call to the de-obfuscation function, there was a 'push offset' call, like so:. How To Use Python Obfuscator Options To Give Your Code More Confusing, Annoying Names Inside. The answer is to use our IDA python script to Base64-decode the desired input string, allocate some memory within our emulated process and store the decoded string. This blog is the first in a 3 part series that will provide an in-depth technical analysis on the H1N1 malware. My problem is when I build the project I can obfuscate however when I publish the apk or export the apk it will replace the obfuscated dll with original dll. , then one can simply use the find method in the string module to extract fields (see section 4. pyminifier. Also, replaces all of said builti-in functions in tokens with each respective obfuscated identifer. When you need encrypt/obfuscate strings in your program so that they don't just show up with a strings or hex tool when your executable is examined, this tool can be useful. ViperMonkey is a Python project including a VBA macro parser, a VBA emulation engine and a set of tools for malicious macro analysis. *I'm using this encrypted string to identify emails from a user. Terminal string styling done right, in Python. IMO, the immense power of the shell Please let me know if there is any other human readable language that can do this The DEMO code below was an idea I formed to see how to make a bash script very difficult to hack. These Str nodes have one interesting field, namely the s field, which contains the actual string. NET A simple way to encrypt query strings. It is a C++ template library of containers, algorithms, and iterators useful for runtime and tool development across multiple platforms. Javascript Obfuscator greatly compresses size and improves download time and execution speed of the protect javascript files. Expert Ajay Kumar revisits the topic of data obfuscation techniques and explores the architectures, approaches and best practices for protecting enterprise data. OK, I Understand. Data Obfuscation; The main aim of these techniques is to convert variable or constant values into the computational results of one or server variables or constants. Original string: This is a test message to prove the concept. Obfuscation-know-your-enemy-eyrolles-2014. Cracking Obfuscated Code. I mean: once I obfuscated the exe file for the first time, I copied it to his project folder to test it in his context. Remove documentation strings. Although it is a very bad practice, it does not automatically render an index useless if you consistently. Quick start guide. #!/usr/bin/python import re,sys,zlib,base64,argparse obfuscation_methods = [ ('replace','Replace String','replace\s?\('), ('decompress','Compress string. This option is recommended if your original source code isn't small, as the helper function can attract attention. Definition and Usage. How does it work? Simply put, by misusing the Python source encodings feature. In the AST, constant String nodes are represented with Str nodes. > -- by Rick Johnson > > IDLE --which is the Python Integrated Development and Learning > Environment-- was once the apple of Guido's eye but has since > degenerated into madness many years ago and remains now as the shining > jewel "show piece" on the proverbial python wall of shame. Note the heavy use of Trace. We might need to obfuscate them and provide some basic security without writing some. py for Package. Overall it didn't prove to be terribly difficult as Ruby and Python share a lot of commonality. with __getattr__ and friends). It confuses local variables, arguments of functions and methodes, but doesn’t confuse javascript core and client’s classes, functions, methods or properties. Original string: This is a test message to prove the concept. Python Forums on Bytes. Functions that access runtime namespace ( exec, dir, locals, globals) may go wrong because of accessing objects that has been renamed. A string is the same as a list of characters, so it makes no difference. The book covers all the crucial areas regarding Python language and introduces one towards the much-needed techniques that has a huge scope, including simple string concentration to that of recursive decent parsers writing. There are a few different ways payloads can be delivered through Microsoft Office documents, including macros, OLE embedding, Addins, Actions and DDE. In Python if the target string small & your matching expression is simple use string. Search Search. After encoding the whole code, the malware author reversed the string and placed it in the file. How Android Malware Fights (and we ght back!) or Research on obfuscation in Android malware Axelle Apvrille, Ruchna Nigam Fortiguard Labs, Fortinet CARO Workshop, Melbourne, Florida, USA May 2014 Slides have been edited for public release. The Python Discord. with getattr) and on the other hand the lookup of names can be controlled (e. Ruby Python JavaScript Front Simple method to obfuscate strings in JavaScript This is a super simple hashing algorithm to take a string and obfuscate it to. I'm looking at a task to obfuscate strings in my application like URLs, paths and queries at compile time. With Pyminifier, you can choose the kind of obfuscation you want. Unsupported python language features. Michael Haephrati, CodeProject MVP 2013. They don't want people to easily decompile their proprietary Python app. below is the decoded string output of my python script. Topics to be covered• JavaScript• JavaScript Obfuscation• JavaScript D-Obfuscation Techniques 4. The ODBC connection is generated with a connection string. All you got to do is rip the stream section apart using your favorite hex editor. Default port from script it's 13123. Decode, Encode or Obfuscate your string This is used to obfuscate your string or code, to encode or decode a certain value. The bulk of the document describes the Python API it exposes. with getattr) and on the other hand the lookup of names can be controlled (e. Therefore any string can potentially contain a name. Script to rename strings in a binary for obfuscation purposes - CleanBinaryStrings. Online Hash Calculator lets you calculate the cryptographic hash value of a string or file. Now let's move to the main motive of this tutorial. NB: The Salt has been rearranged because the original arrangement was not able to obfuscate all 3 strings. Obfuscation Software Informer. Behind each exploit there is a history of creativity and incredible knowledge. My questions are: Should I open source all of my main program? If I need to open my source code, can I do code obfuscation?. RCE: Obfuscation and CommunicationsAdam Meyers - SRA International Significant Work. Online VBScript Obfuscator/Defuscator (Encrypt/Protect VBS) Using this handy VBS tool, you can convert your VBScript into an obfuscated VBS source code, without compromising/altering the scripting functionalities and the VBScript keywords. Interestingly the SSS developers went to great lengths with the obfuscation algorithm, using AES-256 for example, yet in the end it's still easily decipherable because they bundle the randomly generated encryption key in the encoded string. 0" } task obfuscate(type: proguard. whitespace: The python module string contains string constants that might be useful to you. Now, I want to obfuscate as much of my program as I can, though if I obfuscate everything it won't work anymore because those class names in the. In this tutorial, we are going encrypt a message in Python via reverse cipher. py files into. js open source php. We all know that Python is a high-level programming language and making games in Python seems like a more and more common practice nowadays and games coded in Python are gaining incredible fame. You can use getattr, setattr, exec and eval by excluding the identifiers they use. The decoded array bears another level of obfuscation - simple base64 encoding. It continues to be no surprise that malware tries to hide using an array of techniques that are easy to implement. Gcat is a stealthy Python backdoor that uses Gmail as a command and control server. pdf), Text File (. In this attack scenario, a malicious command will be embedded. Functions that access runtime namespace ( exec, dir, locals, globals) may go wrong because of accessing objects that has been renamed. I'm looking at a task to obfuscate strings in my application like URLs, paths and queries at compile time. There just cannot be a python obfuscator that works for a general python program. If `message_as_string` and `as_string` just weren't there in 3. In fact, what you posit is covered already in the 'ABOUT' file I distributed with pyfuscate. file encode-str "string to encode" python -m obfuscator. RegEx for python templating test. An indirect can be used — Referenced — from anywhere else that a normal object (string, integer, etc. > -- by Rick Johnson > > IDLE --which is the Python Integrated Development and Learning > Environment-- was once the apple of Guido's eye but has since > degenerated into madness many years ago and remains now as the shining > jewel "show piece" on the proverbial python wall of shame. Obfuscation can be used to protect email addresses (i.