Get Started

Learn how to configure settings for Scribbler, such as your syntax highlighting preference and the default saving folder location.

Installation

              
                $ scribbler  ——config
                  {
                    “encryption”: true, 
                    “highlighting“: true,
                    “prettyTable”: false,
                    “font”: [“Helvetica”, “sans-serif”],
                    “folder”: “~/Desktop“
                  }
              
            

Configuration

Learn how to configure settings for Scribbler, such as your syntax highlighting preference and the default saving folder location.

Options Value Default
encryption encrypt all notes before saving. If turned on, it requires password to open the file. false
highlighting Show syntax highlight on markdown text. true
prettyTable Render table with Scribbler’s pretty table style. true

Malis percipitur an pro. Pro aperiam persequeris at, at sonet sensibus mei, id mea postulant definiebas concludaturque. Id qui malis abhorreant, mazim melius quo et. At eam altera dolorum, case dicant lobortis ius te, ad vel affert oportere reprehendunt. Quo no verterem deseruisse, mea brute postea te, ne per tacimates suavitate vituperatoribus.


Keybindings

If you have many extensions installed or you have customized your keyboard shortcuts, you can sometimes have keybinding conflicts where the same keyboard shortcut is mapped to several commands.

This can result in confusing behavior, especially if different keybindings are going in and out of scope as you move around the editor.

The Keyboard Shortcuts editor has a context menu command Show Conflicts, which will filter the keybindings based on a keyboard shortcut to display conflicts.


Issues

It is obvious to you that this is not the desired behavior and it needs to be corrected to provide proper stability to the application. However, there are other side effects that you may not have considered.

One way is to take the class example and extend it to include a virtual method so the class contains a VTABLE. Now the pOld overwrite can change the VTABLE pointer. If the overwrite action can be modified by the user they could potentially point the VTABLE functions to some code they want to execute and not the proper code to be executed you have a security exploit.