home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Monster Media 1996 #14
/
Monster Media No. 14 (April 1996) (Monster Media, Inc.).ISO
/
pcboard
/
hb_mb11.zip
/
BRDM.PPE
(
.txt
)
< prev
next >
Wrap
PCBoard Programming Language Executable
|
1995-12-26
|
1KB
|
113 lines
;------------------------------------------------------------------------------
; .ss.
; `²²'
; .,sS$Ss,,s$ .,sS$$$Ss. .,sS$Ss,,s$ .ss. .sSs.
; .d$$²^°²$$$$'.d$P²°^^²$P'.d$$²^°²$$$$'.$$$' .$$$²Sb,.
; $$$' .$$$' $$$²Sçsµ²' .$$$' .$$$'.$$$' .$$$' `$$b.
; $$$b,,d$$$' ,$$$b,....,s$$$$b,,d$$$'.$$$;.,$$$' ;$$$
; `²S$$S²²S$$S²°²S$$$$S²°°²S$$$$$$',$$S²°²S$S'.sS$$$P²'
; .sS²°$$$²²°"' d²°'
; .$$² .$$'
; $$$.,d$$'
; `²S$$S²'
;------------------------------------------------------------------------------
; P.P.L.X. 2.OO (C)1996 - Lone Runner / AEGiS CoRP'96
;------------------------------------------------------------------------------
; PPE 3.2O (Encryption type I) - Analysis ON - Postprocessing ON
;------------------------------------------------------------------------------
Boolean BOOLEAN001
Boolean BOOLEAN002
Integer INTEGER001
Integer INTEGER002
Integer INTEGER003
String STRING001
String STRING002
String STRING003
String STRING004
String STRING005
;------------------------------------------------------------------------------
STRING003 = PcbNode()
STRING004 = PPEPath() + "NODE" + STRING003 + ".XXX"
INTEGER003 = FNext()
If (Exist(STRING004)) Then
STRING001 = ReadLine(STRING004, 1)
INTEGER001 = ToInteger(ReadLine(STRING004, 2))
Else
STRING001 = U_Name()
INTEGER001 = 1
FCreate INTEGER003, STRING004, 1, 3
FPutLn INTEGER003, STRING001
FPutLn INTEGER003, INTEGER001
FClose INTEGER003
Endif
BOOLEAN002 = (CurSec() >= SysopSec())
BOOLEAN001 = (STRING001 == U_Name())
If (!BOOLEAN001) INTEGER001 = 1
If (BOOLEAN002) Then
STRING005 = PPEPath() + "SDISPLAY.LST"
Else
STRING005 = PPEPath() + "DISPLAY.LST"
Endif
INTEGER002 = ReadLine(STRING005, 1)
If (INTEGER001 > INTEGER002) INTEGER001 = 1
STRING002 = ReadLine(STRING005, INTEGER001 + 1)
DispFile STRING002, 2 + 1 + 4
;------------------------------------------------------------------------------
;
; Usage report (before postprocessing)
;
; ■ Statements used :
;
; 4 Goto
; 15 Let
; 4 If
; 1 DispFile
; 1 FCreate
; 1 FClose
; 2 FPutLn
;
;
; ■ Functions used :
;
; 8 +
; 1 ==
; 1 >
; 1 >=
; 3 !
; 2 U_Name()
; 3 PPEPath()
; 1 PcbNode()
; 4 ReadLine()
; 1 SysopSec()
; 1 CurSec()
; 1 Exist()
; 1 ToInteger()
; 1 FNext()
;
;------------------------------------------------------------------------------
;
; Analysis flags : s
;
; s - Sysop level access ■ 5
; Program is reading the sysop access level, this may be normal
; but still it is very suspect. It is the best way to give a user
; all priviledges. Check!
; ■ Search for : SYSOPSEC()
;
;------------------------------------------------------------------------------
;
; Postprocessing report
;
; 0 For/Next
; 0 While/EndWhile
; 2 If/Then or If/Then/Else
; 0 Select Case
;
;------------------------------------------------------------------------------
; AEGiS Corp - Break the routines, code against the machines!
;------------------------------------------------------------------------------