Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Hard coding
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{Short description|Putting data in the source code of a program}} {{redirect|Hardcoded|the video game|Hardcoded (video game)}} {{More citations needed|date=May 2021}} '''Hard coding''' (also '''hard-coding''' or '''hardcoding''') is the software development practice of embedding data directly into the [[source code]] of a [[computer program|program]] or other executable object, as opposed to obtaining the data from external sources or generating it at [[Run time (program lifecycle phase)|runtime]]. Hard-coded data typically can be modified only by editing the source code and [[Compiling|recompiling]] the executable, although it can be changed in [[Volatile memory|memory]] or on disk using a [[debugger]] or [[hex editor]]. Data that is hard-coded is best suited for unchanging pieces of information, such as [[physical constant]]s, [[Version number|version numbers]], and static text elements. Soft-coded data, on the other hand, encodes arbitrary information through [[user input]], [[text files]], [[INI file]]s, HTTP server responses, configuration files, preprocessor macros, external constants, databases, [[command-line argument]]s, and is determined at runtime. ==Overview== Hard coding requires the program's source code to be changed any time the input data or desired format changes, when it might be more convenient to the end user to change the detail by some means outside the program.<ref name="Dustin2002">{{cite book|author=Elfriede Dustin|title=Effective Software Testing: 50 Specific Ways to Improve Your Testing|url=https://books.google.com/books?id=K0qWBUOAf6IC&pg=PA188|year=2002|publisher=Addison-Wesley Professional|isbn=978-0-201-79429-8|pages=188β}}</ref> Hard coding is often required, but can also be considered an [[anti-pattern]].<ref name="Janca2020">{{cite book|author=Tanya Janca|title=Alice and Bob Learn Application Security|url=https://books.google.com/books?id=UT4DEAAAQBAJ&pg=PA15|date=14 October 2020|publisher=Wiley|isbn=978-1-119-68740-5|pages=15β}}</ref> Programmers may not have a dynamic user interface solution for the end user worked out but must still deliver the feature or release the program. This is usually temporary but does resolve, in a short-term sense, the pressure to deliver the code. Later, soft coding is done to allow a user to pass on parameters that give the end user a way to modify the results or outcome. The term "hard-coded" was initially used as an analogy to hardwiring circuits, and was meant to convey the inflexibility that results from its usage within software design and implementation. In the context of run-time extensible [[collaborative development environment]]s such as [[Multi-user dungeon|MUD]]s, hard coding also refers to developing the core engine of the system responsible for low-level tasks and executing [[Scripting language|scripts]], as opposed to '''soft coding''' which is developing the high-level scripts that get interpreted by the system at [[Execution (computing)|runtime]], with values from external sources, such as [[text files]], [[INI file]]s, preprocessor [[Macro (computer science)|macro]]s, external constants, [[database]]s, [[command-line argument]]s, [[HTTP]] [[Server (computing)|server]] responses, [[configuration file]]s, and [[user input]]. In this case, the term is not pejorative and refers to general development, rather than specifically embedding output data. == Hard coding and backdoors == Hard coding credentials is a popular way of creating a [[Backdoor (computing)|backdoor]]. Hard coded credentials are usually not visible in configuration files or the output of account-enumeration commands and cannot be easily changed or bypassed by users. If discovered, a user might be able to disable such a backdoor by modifying and rebuilding the program from its [[source code]] ([[FLOSS|if source is publicly available]]), [[decompiling]], or [[reverse-engineering]] [[software]], [[hex editor|directly editing]] the program's [[binary code]], or instituting an integrity check (such as digital signatures, anti-tamper, and [[anti-cheat]]) to prevent the unexpected access, but such actions are often prohibited by an [[end-user license agreement]]. ==Hard coding and DRM== As a [[digital rights management]] measure, software developers may hard code a unique [[serial number]] directly into a program. Or it is common to hard code a [[public key]], creating the DRM for which it is infeasible to create a keygen. On the opposite case, a [[software cracker]] may hard-code a valid serial number to the program or even prevent the executable from asking the user for it, allowing unauthorized copies to be redistributed without the need of entering a valid number, thus sharing the same key for every copy, if one has been hard-coded. == Fixed installation path == If a Windows program is programmed to assume it is always installed to C:\Program Files\Appname and someone tries to install it to a different drive for space or organizational reasons, it may fail to install or to run after installation. This problem might not be identified in the testing process, since the average user installs to the default drive and directory and testing might not include the option of changing the installation directory. However, it is advisable for programmers and developers not to fix the installation path of a program, since the default installation path depends on the operating system, OS version, and [[sysadmin]] decisions. For example, many installations of [[Microsoft Windows]] use [[Drive letter assignment#Common assignments|drive C:]] as their primary [[hard disk]], but this is not guaranteed. There was a similar issue with [[microprocessor]]s in early computers, which [[reset (computing)|started execution]] at a fixed [[address space|address]] in memory. ==Startup disk== Some "[[copy protection|copy-protected]]" programs look for a particular file on a floppy disk or flash drive on startup to verify that they are not unauthorized copies. If the computer is replaced by a newer machine, which doesn't have a floppy drive, the program that requires it now can't be run since the floppy disk can't be inserted. This last example shows why hard coding may turn out to be impractical even when it seems at the time that it would work completely. In the 1980s and 1990s, the great majority of PCs were fitted with at least one floppy drive, but floppy drives later fell out of use. A program hard-coded in that manner 15 years ago could face problems if not updated. ==Special folders== Some Windows operating systems have so-called ''[[Special Folders]]'' which organize files logically on the hard disk. There are problems that can arise involving hard coding: ===Profile path=== Some Windows programs hard code the profile path to developer-defined locations such as <code>C:\Documents and Settings\''Username''</code>. This is the path for the vast majority of [[Windows 2000]] or above, but this would cause an error if the profile is stored on a network or otherwise relocated. The proper way to get it is to call the <code>GetUserProfileDirectory</code> function or to resolve the <code>%userprofile%</code> environment variable. Another assumption that developers often make is assuming that the profile is located on a local hard disk. ===My Documents folder path=== Some Windows programs hard code the path to <code>[[My Documents]]</code> as <code>''ProfilePath''\My Documents</code>. These programs would work on machines running the English version, but on [[internationalization and localization|localized]] versions of Windows this folder normally has a different name. For example, in Italian versions the <code>My Documents</code> folder is named ''Documenti''. <code>My Documents</code> may also have been relocated using Folder Redirection in Group Policy in Windows 2000 or above. The proper way to get it is to call the <code>SHGetFolderPath</code> function. ==Solution== An indirect reference, such as a variable inside the program called "FileName", could be expanded by accessing a "browse for file" dialogue window, and the program code would not have to be changed if the file moved. Hard coding is especially problematic in preparing the software for translation to other languages. In many cases, a single hard-coded value, such as an array size, may appear several times within the source code of a program. This would be a [[Magic number (programming)|magic number]]. This may commonly cause a program bug if some of the appearances of the value are modified, but not all of them. Such a bug is hard to find and may remain in the program for a long time. A similar problem may occur if the same hard-coded value is used for more than one parameter value, e.g. an array of 6 elements and a minimum input string length of 6. A programmer may mistakenly change all instances of the value (often using an editor's search-and-replace facility) without checking the code to see how each instance is used. Both situations are avoided by defining [[constant (programming)|constant]]s, which associate names with the values, and using the names of the constants for each appearance within the code. One important case of hard coding is when strings are placed directly into the file, which forces translators to edit the source code to translate a program. (There is a tool called <code>[[gettext]]</code> that permits strings to be left in files, but lets translators translate them without changing the source code; it effectively de-hard codes the strings.) ==Hard coding in competitions== In computing competitions such as the [[International Olympiad in Informatics]], contestants are required to write a program with specific input-output pattern according to the requirement of the questions. In rare cases where the possible number of inputs is small enough, a contestant might consider using an approach that maps all possible inputs to their correct outputs. This program would be considered a hard-coded solution as opposed to an [[algorithm]]ic one (even though the hard-coded program might be the output of an algorithmic program). ==Soft coding== '''Soft coding''' is a [[computer coding]] term that refers to obtaining a value or function from some external resource, such as [[text files]], [[INI file]]s, [[preprocessor]] [[Macro (computer science)|macros]], external constants, [[configuration file]]s, [[command-line argument]]s, databases, user input, HTTP server responses. It is the opposite of hard coding, which refers to coding values and functions in the source code. ===Programming practice=== Avoiding hard coding of commonly altered values is good programming practice. Users of the software should be able to customize it to their needs, within reason, without having to edit the program's source code. Similarly, careful programmers avoid [[Magic number (programming)#Unnamed numerical constants|magic numbers]] in their code to improve its readability and assist maintenance. These practices are generally not referred to as ''soft coding''. The term is generally used where soft coding becomes an [[anti-pattern]]. Abstracting too many values and features can introduce more complexity and maintenance issues than would be experienced with changing the code when required. Soft coding, in this sense, was featured in an article on [[The Daily WTF]].<ref>[http://thedailywtf.com/Articles/Soft_Coding.aspx Softcoding] from [[The Daily WTF]]</ref> ===Potential problems=== At the extreme end, soft-coded programs develop their own poorly designed and implemented scripting languages, and configuration files that require advanced programming skills to edit. This can lead to the production of utilities to assist in configuring the original program, and these utilities often end up being soft coded themselves. The boundary between proper configurability and problematic soft-coding changes with the style and nature of a program. Closed-source programs must be very configurable<!-- but generally aren't! -->, as the end user does not have access to the source to make any changes. In-house software and software with limited distribution can be less configurable, as distributing altered copies is simpler. Custom-built web applications are often best with limited configurability, as altering the scripts is seldom any harder than altering a configuration file. <!-- Witness the scores of CMS systems that are so much harder to work with than a bunch of html files in www/data! --> To avoid soft coding, consider the value to the end user of any additional flexibility you provide, and compare it with the increased complexity and related ongoing maintenance costs the added configurability involves. ===Achieving flexibility=== Several legitimate design patterns exist for achieving the flexibility that soft coding attempts to provide. An application requiring more flexibility than is appropriate for a configuration file may benefit from the incorporation of a [[scripting language]]. In many cases, the appropriate design is a [[domain-specific language]] integrated into an established scripting language. Another approach is to move most of an application's functionality into a library, providing an API for writing-related applications quickly. ==See also== * [[Closed-source software]] * [[Firmware]] * [[Inner-platform effect]] * [[Rule of least power]] * [[Self-modifying code]] ==References== {{reflist}} [[Category:Anti-patterns]]
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)
Pages transcluded onto the current version of this page
(
help
)
:
Template:Cite book
(
edit
)
Template:More citations needed
(
edit
)
Template:Redirect
(
edit
)
Template:Reflist
(
edit
)
Template:Short description
(
edit
)