Windows

How Do I Load an Existing Rails Project?

Just trying to load a Rails project that was created elsewhere.

How can I load it into Komodo?

Thanks - Jonathan

Firewall Hole(s) for Win32::Service

Does anyone know what hole(s) need to be punched in a firewall to allow a Perl script running Win32::Service to access the services? In particular, I am initially interested in getting GetServices(hostName, hashref) to work. Eventually, I may be interested in the ability to start/stop services, but right now I need to enumerate the running services.

Thanks,
James.

Where can I get the Visual Studio PDB files for ActivePython builds?

I currently have ActivePython-2.7.2.5-win32-x86.msi installed on my computer and python.exe is hanging. I won't go into all of the details of this hang, but in order to continue debugging I have decided that it is necessary to debug the C code that makes up the Python interpreter. I have successfully attached Visual Studio to the python.exe process. The problem is that Visual Studio is looking for the debugging symbols for python.exe and I don't have them and don't know where to find them.

My question is: Where can I get the pdb debugging symbols file for ActivePython builds, ideally ActivePython-2.7.2.5?

Windows 8 - ActivePython

Since installing Windows 8 Pro, and having to RE-INSTALL everything else because Windows 8 sucks big time, I find that all processes I run in Python 2.72 now fail with the result of "IV must be 16 bytes long". Nothing now works. Has anyone else had this problem, and/or can someone give me an idea on how to fix it?

Eugene Humbert

ActivePerl CVE-2012-5377 Insecure File Permissions Vulnerability

Question: 

We have read the Security alert for CVE-2012-5377, and would like more information.

Answer: 

This is not a new issue, and it's not really an ActivePerl issue. This vulnerability is a member of a class of vulnerabilities that apply to any software which needs to have a user-writable directory on $PATH. It has been a security concern on Windows for as long as software has been avoiding dll conflicts by using custom library paths.

It is already possible to mitigate the vulnerability by choosing to override the default install path and install to one of the various protected program files silos that newer versions of Windows offer. We don't do this as the default because ActivePerl has a long legacy of scripts and modules which do not handle spaces in the pathname.

It is also possible to migate the vulnerability on an inplace install. This powershell script will copy the permissions to the Perl directory (replace with your directory name, as installed):

powershell -command "(Get-Item 'C:\Program Files').GetAccessControl('Access') | set-acl 'C:\Perl'"

Be advised that protecting Perl from this vulnerability *will* result in reduced functionality. With altered acls, PPM will be unable to manage modules unless it is run with elevated priviledges.

Powershell is included in Windows 7. With older versions, you may be able to download.

ActiveTcl CVE-2012-5378 Insecure File Permissions Vulnerability

Question: 

We have read the Security alert for CVE-2012-5378, and would like more information.

Answer: 

This is not a new issue, and it's not really an ActiveTcl issue. This vulnerability is a member of a class of vulnerabilities that apply to any software which needs to have a user-writable directory on $PATH. It has been a security concern on Windows for as long as software has been avoiding dll conflicts by using custom library paths.

It is already possible to mitigate the vulnerability by choosing to override the default install path and install to one of the various protected program files silos that newer versions of Windows offer. We don't do this as the default because ActiveTcl has a long legacy of scripts and modules which do not handle spaces in the pathname.

It is also possible to migate the vulnerability on an inplace install. This powershell script will copy the permissions to the Tcl directory (replace with your directory name, as installed):

powershell -command "(Get-Item 'C:\Program Files').GetAccessControl('Access') | set-acl 'C:\Tcl'"

Be advised that protecting Tcl from this vulnerability *will* result in reduced functionality. With altered acls, teacup will be unable to manage modules unless it is run with elevated priviledges.

Powershell is included in Windows 7. With older versions, you may be able to download.

ActivePython CVE-2012-5379 Insecure File Permissions Vulnerability

Question: 

We have read the Security alert for CVE-2012-5379, and would like more information.

Answer: 

This is not a new issue, and it's not really an ActivePython issue. This vulnerability is a member of a class of vulnerabilities that apply to any software which needs to have a user-writable directory on $PATH. It has been a security concern on Windows for as long as software has been avoiding dll conflicts by using custom library paths.

It is already possible to mitigate the vulnerability by choosing to override the default install path and install to one of the various protected program files silos that newer versions of Windows offer. We don't do this as the default because ActivePython has a long legacy of scripts and modules which do not handle spaces in the pathname.

It is also possible to migate the vulnerability on an inplace install. This powershell script will copy the permissions to the Python directory (replace with your directory name, as installed):

powershell -command "(Get-Item 'C:\Program Files').GetAccessControl('Access') | set-acl 'C:\Python'"

Be advised that protecting Python from this vulnerability *will* result in reduced functionality. With altered acls, PyPM will be unable to manage modules unless it is run with elevated priviledges. If you are using virtualenv, you will not be fully protected from this vulnerability unless you protect your virtualenv directory as well.

Powershell is included in Windows 7. With older versions, you may be able to download.

Auto-refresh Firefox (or other browser) upon saving file.

Macro 1: Automatically refreshes the browser based upon a pref called ffrefreshstatus.
The macro executes a small vbs script which switches to firefox and performs a refresh of the current tab.

refresh();

function refresh() {

       
                var pref_name = ko.interpolate.interpolateStrings('ffrefreshstatus');
                var do_refresh = false;
                if (pref_name) {
                        var prefs = Components.classes['@activestate.com/koPrefService;1'].getService(Components.interfaces.koIPrefService).prefs;
                        if (prefs.hasBooleanPref(pref_name)) {
                                do_refresh = prefs.getBooleanPref(pref_name);
                        }

Net-Sftp-Foreign not working with PerlNET

I have a script that uses Net-Sftp-Foreign that works every time from perl interpreter, and fails everytime when ran as a compiled exe from perlnet. I connect to an sftp site, and get a directory listing. In perl, it works, in exe it dies. Any ideas?

Example exe output w/ debug turned on:

# This is Net::SFTP::Foreign 1.73
# Loaded from /Net/SFTP/Foreign.pm
# Running on Perl v5.10.1 for MSWin32
# debug set to 25
# ~0 is 4294967295
# Using backend Net::SFTP::Foreign::Backend::Windows 1.70_08
# ssh cmd: plink -P xxx -pw xxx -l xxx -v xxxx -s sftp