Tags3d design 3d modeling akn-include autocad autocad electrical AutoCAD tips Autodesk autodesk 2015 autodesk event Autodesk Inventor autodesk revit autodesk subscription autodesk training autodesk vault BIM BIM 360 BIM Building Information Modeling building design building information modeling civil 3d civil design Construction data management digital prototyping engineering design fusion 360 how to infrastructure design inventor inventor tips manufacturing manufacturing design new features PLM PLM 360 product design Revit simulation software Synergis University technology tips training Vault what's new
Most Popular Posts
Ready to Take the Next Step?
August 26, 2019
Posted by Mark Lancaster – Synergis Helpdesk Technical & Autodesk Expert Elite
Over the weekend I came across this post on LinkedIn from someone in my network. For me personally, this was something I had never even considered, and possibly never even realized was possible via iLogic – but as Clint demonstrates, it is possible. I wanted to take a few minutes this morning to make you aware of this potential security issue. What Clint points out about protecting ourselves should be done no matter if you’re dealing with iLogic in your models and designs, or not.
With so many in the Autodesk community sharing information and program snippets to assist each other, it is important to know who you are sending/receiving information to and “think before you click”. Now I’m not saying others are out to harm you, but if you don’t know what the entire code is doing, how do you know it’s not going to negatively impact your security, network infrastructure, or PC? Although Autodesk recommends “ticking” this feature, it is not enabled by default.
To access this dialog box, please follow these steps:
Tools > Options
iLogic Configurator > Security Options
Manage > Event Triggers > Security
Check “Inspect rules for malicious code”
Until next time…