Author:
- Name: Szabolcs Borsanyi
Location: DE - Federal Republic of Germany (Germany)
To build:
make
Bugs and (Mis)features:
The current status of this entry is:
STATUS: INABIAF - please DO NOT fix
For more detailed information see 2006/borsanyi in bugs.html.
To use:
./borsanyi string > file.gif
Try:
./try.sh
We recommend you first try inputting for the filename example.gif
and for the
string ioccc@example.com
. Of course you could also provide a different
filename and even include your own email address or something else entirely.
The script will not overwrite files. It runs the program in a loop until you
answer that you do not wish to make another.
Judges’ remarks:
This entry uses a very user-friendly representation of the font it uses (with a few exceptions). Check out the source and see for yourself! :-)
The resulting GIF file is likely to puzzle optical character
recognition tools. The amount of imagination necessary to
recognise the @
character will certainly challenge a few
anti-CAPTCHA tools.
Author’s remarks:
Email address to gif converter
Introduction:
Most spam robots collect email addresses from the websites of
innocent people, like you. Conference organizers cannot disclose
the participant’s address to prevent malicious users from
grabbing them. One solution is to write as my_email _at_ address _dot_ com
. But robots are clever enough to sort that out. A
more sophisticated approach is to create an image file with the
email address and put that on the web page.
This program creates a GIF image file from the address given in the command line. To avoid complications with patent issues the LZW compression feature is not used. A typical email address is stored in less than 1-2 kilobytes.
Usage:
make all
./borsanyi my@example.com > email.gif
my_favourite_gif_viewer email.gif
The address cannot be longer than 42 characters, and may consist of
the characters: a-z_A-Z0-9@.-
.
The program is (like email addresses are) case insensitive.
Obfuscation:
Multicore support is a must in present-day applications. This entry supports up to 25 cores. The odd names in the bottom part of the program do have a meaning, they are not there just for obfuscation. The preprocessor is used to keep the program small, in fact, everything is a macro. Are you familiar with the GIF format? Studying this program will give you a (very) little insight.
Questions:
After analyzing the source code, try to answer these questions:
- How can you add a further supported symbol?
- Can you alter the look of the output characters?
- What limits the number of input characters to 42?
Portability:
The program uses POSIX threads (using the linker flag -lpthread
).
The program accepts email addresses not longer than 42 bytes
composed from letters, digits, and the @._-
symbols. An address
not obeying these rules will cause undefined behaviour. The
program is not expected to depend on endianness. The standard
output is used for a binary output, which might cause problems.
To avoid most caveats, the program does not output the octet
0x0a
. The program assumes the use of ASCII.
Inventory for 2006/borsanyi
Primary files
- borsanyi.c - entry source code
- Makefile - entry Makefile
- borsanyi.orig.c - original source code
- try.sh - script to try entry
Secondary files
- 2006_borsanyi.tar.bz2 - download entry tarball
- README.md - markdown source for this web page
- .entry.json - entry summary and manifest in JSON
- .gitignore - list of files that should not be committed under git
- .path - directory path from top level directory
- index.html - this web page