
Security News
Risky Biz Podcast: Making Reachability Analysis Work in Real-World Codebases
This episode explores the hard problem of reachability analysis, from static analysis limits to handling dynamic languages and massive dependency trees.
NAME
Guid - Produce GUID/UUID from Ruby
SYNOPSIS
require 'guid'
g = Guid.new puts g # 79328095-636a-6cc5-2bbb-606df7228a01 puts g.to_s # 79328095-636a-6cc5-2bbb-606df7228a01 puts g.hexdigest # 79328095636a6cc52bbb606df7228a01 puts g.raw.inspect # "\227#\010Y6\246\306\\262\273\006\326\177"\250\020" puts g.raw.length # 16
g2 = Guid.new puts g == g2 # false (it better be! :-)
g3 = Guid.from_s("79328095-636a-6cc5-2bbb-606df7228a01") puts g3 # 79328095-636a-6cc5-2bbb-606df7228a01 puts g == g3 # true
g4 = Guid.from_raw("\227#\010Y6\246\306\\262\273\006\326\177"\250\020") puts g4 # 79328095-636a-6cc5-2bbb-606df7228a01 puts g == g4 # true
DESCRIPTION
This library can produce GUID/UUID on Windows (except first release of Win95 and older version) and on Unix using random number. I have only tested this library under Win2k and Redhat 7.3; please report if you fail to use it on other platforms. On Windows, it uses CryptGenRandom(). On Unix, it uses /dev/urandom (and if fail, try to use /dev/random). No other external program or library is needed.
The latest version of this library can be obtained from:
http://rubyforge.org/projects/uuid/
To install:
% ruby install.rb config
% ruby install.rb setup
# ruby install.rb install
SEE ALSO
CREDITS
LICENSE
Copyright (c) 2004 David Garamond .
This library is free software; you can redistribute it and/or modify it under the same terms as Ruby itself.
FAQs
Unknown package
We found that guid demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 3 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
This episode explores the hard problem of reachability analysis, from static analysis limits to handling dynamic languages and massive dependency trees.
Security News
/Research
Malicious Nx npm versions stole secrets and wallet info using AI CLI tools; Socket’s AI scanner detected the supply chain attack and flagged the malware.
Security News
CISA’s 2025 draft SBOM guidance adds new fields like hashes, licenses, and tool metadata to make software inventories more actionable.