this is strange. I've been reading the PM for a good time now and have always admired many of those obfuscated code snippets. But it never came to me, how those were done and how to work such a thing out. Then suddenly this morning my first JAPH sprang into my mind and one hour later I got this: (
#! /usr/bin/perl -w
use strict;
$_='sub justify{
$_ = __;s:if::g;
s:y: :;$_;}sub the {$_=__."r
";s=^=ano=;$_;}sub pearls{$_=__." ";
s-[as]--g;$_} print justify, the, pearls, "hacker\n"';
eval();sub __{$_="baaa";$_=(caller(s/b//))[s/a//g];s=[^:]+::==g;$_;}
I tried to find a nicer formatting but I coundn't find anything, so that's left for the next lessons I'll take :).
In reply to JAPH #1
by stefan k