Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. OpenGL Extractor

OpenGL Extractor

Scheduled Pinned Locked Moved The Lounge
delphigraphicsgame-dev
8 Posts 3 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • M Offline
    M Offline
    Matthew Hazlett
    wrote on last edited by
    #1

    This is the coolest thing I have seen in a long time... http://ogle.eyebeamresearch.org/ [^] Matthew Hazlett Sometimes I miss the simpler DOS days of Borland Turbo Pascal (but not very often).

    L 1 Reply Last reply
    0
    • M Matthew Hazlett

      This is the coolest thing I have seen in a long time... http://ogle.eyebeamresearch.org/ [^] Matthew Hazlett Sometimes I miss the simpler DOS days of Borland Turbo Pascal (but not very often).

      L Offline
      L Offline
      Lost User
      wrote on last edited by
      #2

      My first thought was *cool*. Then I started thinking that, for the most part, 3D objects are copyrighted just like any other work. So "...allows for the capture and re-use of 3D geometry data from 3D graphics applications..." is a bit misleading without a disclaimer reminding people that poaching and reusing copyrighted works (which most game characters and the like are) is still illegal. I don't think that providing the software or technology is wrong - in fact I can think of a lot of good uses for it. It's how some people will use it that poses some problems. Ultimately I think it means that sooner or later OpenGL, DirectX and other API's are going to be pressured to implement some kind of encryption so the models can't be poached so easily. Anyway, thanks for the link! Cheers, Drew.

      E 1 Reply Last reply
      0
      • L Lost User

        My first thought was *cool*. Then I started thinking that, for the most part, 3D objects are copyrighted just like any other work. So "...allows for the capture and re-use of 3D geometry data from 3D graphics applications..." is a bit misleading without a disclaimer reminding people that poaching and reusing copyrighted works (which most game characters and the like are) is still illegal. I don't think that providing the software or technology is wrong - in fact I can think of a lot of good uses for it. It's how some people will use it that poses some problems. Ultimately I think it means that sooner or later OpenGL, DirectX and other API's are going to be pressured to implement some kind of encryption so the models can't be poached so easily. Anyway, thanks for the link! Cheers, Drew.

        E Offline
        E Offline
        El Corazon
        wrote on last edited by
        #3

        Drew Stainton wrote:

        My first thought was *cool*.

        My first thought was "what would it do with my software" I do some nasty invisible tricks to keep the performance and high-resolution maxed. you honestly don't need encryption, some of the performance hacks I use overloads most analysis products. This isn't new in concept, wiregl would intercept 3D commands going to the card and send it across a network to multiple displays. Gldebugger and nvperf intercepts 3D commands and displays performance and trace information for diagnostics. It's a short jump to saying "why not log it and reassemble it?" We'll just all go to progressive mesh and multi-origin designs so that the data is never the same from second to second and always overlapping so that you overload the poor thing. :) I wouldn't worry about the 3D software writers too much. _________________________ Asu no koto o ieba, tenjo de nezumi ga warau. Talk about things of tomorrow and the mice in the ceiling laugh. (Japanese Proverb)

        L 1 Reply Last reply
        0
        • E El Corazon

          Drew Stainton wrote:

          My first thought was *cool*.

          My first thought was "what would it do with my software" I do some nasty invisible tricks to keep the performance and high-resolution maxed. you honestly don't need encryption, some of the performance hacks I use overloads most analysis products. This isn't new in concept, wiregl would intercept 3D commands going to the card and send it across a network to multiple displays. Gldebugger and nvperf intercepts 3D commands and displays performance and trace information for diagnostics. It's a short jump to saying "why not log it and reassemble it?" We'll just all go to progressive mesh and multi-origin designs so that the data is never the same from second to second and always overlapping so that you overload the poor thing. :) I wouldn't worry about the 3D software writers too much. _________________________ Asu no koto o ieba, tenjo de nezumi ga warau. Talk about things of tomorrow and the mice in the ceiling laugh. (Japanese Proverb)

          L Offline
          L Offline
          Lost User
          wrote on last edited by
          #4

          Jeffry J. Brickley wrote:

          My first thought was "what would it do with my software"

          Heh, ya - no kidding :-D

          Jeffry J. Brickley wrote:

          It's a short jump to saying "why not log it and reassemble it?"

          You're right. I know this type of thing has been done for ages - intercepting port data for instance. I guess I'm being a bit paranoid - there aren't that many people who would actually use this to swipe models for commercial purposes anyway :~ . Cheers, Drew.

          E M 2 Replies Last reply
          0
          • L Lost User

            Jeffry J. Brickley wrote:

            My first thought was "what would it do with my software"

            Heh, ya - no kidding :-D

            Jeffry J. Brickley wrote:

            It's a short jump to saying "why not log it and reassemble it?"

            You're right. I know this type of thing has been done for ages - intercepting port data for instance. I guess I'm being a bit paranoid - there aren't that many people who would actually use this to swipe models for commercial purposes anyway :~ . Cheers, Drew.

            E Offline
            E Offline
            El Corazon
            wrote on last edited by
            #5

            Drew Stainton wrote:

            I guess I'm being a bit paranoid - there aren't that many people who would actually use this to swipe models for commercial purposes anyway

            heck yeah there are! Many of the models we use are guarded for distribution, you would not find them on a demo of our application unless it was fully public domain. Which is one reason we use a lot of public domain material. In my case I have it a bit easier than say Doom3/Doom4, I have very limited distribution of binaries. But there are still tricks you can use to fool the capture program, especially in the vertex program side. _________________________ Asu no koto o ieba, tenjo de nezumi ga warau. Talk about things of tomorrow and the mice in the ceiling laugh. (Japanese Proverb)

            1 Reply Last reply
            0
            • L Lost User

              Jeffry J. Brickley wrote:

              My first thought was "what would it do with my software"

              Heh, ya - no kidding :-D

              Jeffry J. Brickley wrote:

              It's a short jump to saying "why not log it and reassemble it?"

              You're right. I know this type of thing has been done for ages - intercepting port data for instance. I guess I'm being a bit paranoid - there aren't that many people who would actually use this to swipe models for commercial purposes anyway :~ . Cheers, Drew.

              M Offline
              M Offline
              Matthew Hazlett
              wrote on last edited by
              #6

              Stealing 3D models for commercial use would be very wrong but extracting them so you can learn how they were built is quite another thing. It's not like someone can come out with a new game and use 3D models from Warcraft. :-) I was more intrested in the programming methods they used to create a 3D models from a physical shape. It started me thinking of medical applications and how sensitive the resolution was etc... I do agree there are not many uses for this other then a 10 second "oh gee isn't this neet gizmo", but still its a neet gizmo and could have some very intresting applications :-) Matthew Hazlett Sometimes I miss the simpler DOS days of Borland Turbo Pascal (but not very often).

              E L 2 Replies Last reply
              0
              • M Matthew Hazlett

                Stealing 3D models for commercial use would be very wrong but extracting them so you can learn how they were built is quite another thing. It's not like someone can come out with a new game and use 3D models from Warcraft. :-) I was more intrested in the programming methods they used to create a 3D models from a physical shape. It started me thinking of medical applications and how sensitive the resolution was etc... I do agree there are not many uses for this other then a 10 second "oh gee isn't this neet gizmo", but still its a neet gizmo and could have some very intresting applications :-) Matthew Hazlett Sometimes I miss the simpler DOS days of Borland Turbo Pascal (but not very often).

                E Offline
                E Offline
                El Corazon
                wrote on last edited by
                #7

                Matthew Hazlett wrote:

                It's not like someone can come out with a new game and use 3D models from Warcraft.

                But someone could take a Naval Warfighter simulation and extract the models and then claim they made them. Fantasy is hard to steelsteal, reality is much easier, but takes as much time to model. _________________________ Asu no koto o ieba, tenjo de nezumi ga warau. Talk about things of tomorrow and the mice in the ceiling laugh. (Japanese Proverb) -- modified at 20:11 Thursday 26th January, 2006

                1 Reply Last reply
                0
                • M Matthew Hazlett

                  Stealing 3D models for commercial use would be very wrong but extracting them so you can learn how they were built is quite another thing. It's not like someone can come out with a new game and use 3D models from Warcraft. :-) I was more intrested in the programming methods they used to create a 3D models from a physical shape. It started me thinking of medical applications and how sensitive the resolution was etc... I do agree there are not many uses for this other then a 10 second "oh gee isn't this neet gizmo", but still its a neet gizmo and could have some very intresting applications :-) Matthew Hazlett Sometimes I miss the simpler DOS days of Borland Turbo Pascal (but not very often).

                  L Offline
                  L Offline
                  Lost User
                  wrote on last edited by
                  #8

                  Matthew Hazlett wrote:

                  but still its a neet gizmo

                  I totally agree. My paranoia comes from the fact that we're releasing a 3D model library in the next couple of months. It's still neat though - I'm sure I'll think of something to use it for. Cheers, Drew.

                  1 Reply Last reply
                  0
                  Reply
                  • Reply as topic
                  Log in to reply
                  • Oldest to Newest
                  • Newest to Oldest
                  • Most Votes


                  • Login

                  • Don't have an account? Register

                  • Login or register to search.
                  • First post
                    Last post
                  0
                  • Categories
                  • Recent
                  • Tags
                  • Popular
                  • World
                  • Users
                  • Groups