Re: Sparkle updater check vulnerability script
Re: Sparkle updater check vulnerability script
- Subject: Re: Sparkle updater check vulnerability script
- From: Yvan KOENIG <email@hidden>
- Date: Wed, 10 Feb 2016 20:28:37 +0100
… set theAppList to read file theSource as «class utf8» # EDITED
As one of my subfolders has a name embedding the character é it was dropped by the stripped script.
After editing the instruction displayed above two more applications were reported :
Yvan KOENIG (VALLAURIS, France) mercredi 10 février 2016 20:28:26
|
_______________________________________________
Do not post admin requests to the list. They will be ignored.
AppleScript-Users mailing list (email@hidden)
Help/Unsubscribe/Update your Subscription:
Archives: http://lists.apple.com/archives/applescript-users
This email sent to email@hidden