in reply to Re: !@#$%^&*
in thread !@#$%^&*
This one's fairly simple, actually. There are really only two parts: An assignment to $_ and a back-tick running of $_.
If you break down the first statement, you'll see it's two strings XOR'd together:
$_ = '%#(/@*(((@!./((%)@+%),@(!#+%)@#/.' # The encrypted string ^ # XOR '@@@@``][\`@@@\@@[`{@[@`@@@@@[~@@@' # The secret decoder ring
So this ends up assigning 'echo Just another Perl hacker>con' to $_. The second line, `$_` simply passes that to the shell and runs it, which will work fine on any Win32 system.
|
|---|
| Replies are listed 'Best First'. | |
|---|---|
|
Re: (SPOILER) - Re: Re: !@#$%^&*
by jaymoo (Novice) on Jan 26, 2001 at 01:38 UTC |