Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon.

Pages: 1-4041-

Protecting mah program

Name: Anonymous 2008-11-07 10:05

- I have written a program, I want people to pay for it
- It is a type of program I don't expect hackers to have motivation to hack (it's a recipe program)
- If the program doesn't receive a valid activation key, it goes into limited trial mode
- The activation key is the SHA1 hash of the installation key + a guid I picked.  They must enter this key to get out of trial mode.
- The installation key is the SHA1 hash of the hard drive model + serial number.  They get this and must email it to me with money.
- I don't expect typical users of this program to know how to spoof the HD serial number (lol females).
- Did I do this right?  Suggestions?

Name: Anonymous 2008-11-07 10:07

- I will probably also accept pictures of tits as payment in exchange for a key.

Name: Anonymous 2008-11-07 10:18

Lame.

Name: Anonymous 2008-11-07 10:44

la-a-a-ame

Name: Anonymous 2008-11-07 11:24

>>1
You will piss users off when they get a new PC / HD or when they reformat (if you use the file system serial number (most likely)).
Are you really scared that some housewife shares the key with her friends? If a key gets on warez websites somehow (how many housewifes use warez websites?), you can always blacklist it in later versions. You should at least give users virtually unlimited new keys.

Also, crackers are likely to crack any crapware that they come across (usually on sites like download.com), especially if it's really easy like your program. It's not really worth fighting though.

Name: Anonymous 2008-11-07 12:05

I will crack your crap. And then I will sell it to the Kenyans.

Name: Anonymous 2008-11-07 12:05

- If the program doesn't receive a valid activation key, it goes into limited trial mode
Just make it think the activation key is valid.

/profit.

Name: Anonymous 2008-11-07 12:36

lame

Name: Anonymous 2008-11-07 14:12

You do know that unless you employ an array of complicated measures to prevent your program from being disassembled/modified, every programmer with two weeks worth of assembly experience can simply override any key validation you code, right?

Name: Anonymous 2008-11-07 15:03

>>9
Not if he's using Java

Name: Anonymous 2008-11-07 15:23

>>10
Are you fucking kidding me? You better be fucking kidding me. There are tools which can let you view and edit the bytecode, they can even get you back the source code. If an obfuscator is used, there are libraries (http://jakarta.apache.org/bcel/) to modify and step through classes at runtime.

I might just ask you to GTFO, if that's okay with you.

Name: Anonymous 2008-11-07 15:24

>>10 Even Java...

Name: Anonymous 2008-11-07 16:26

>>10
Java is even more bidirectional because it's bytecodes are so high-level, and near-perfect decompilers exist.

For C and C++ there are decompilers which can produce equivalent code (actually C++ is decompiled from C), but not for any arbitrary binary.

But you're not trying to understand the program, you're trying to change one little flow path.

Name: Anonymous 2008-11-07 16:38

Forget it, it's NP-complete.

damn /prog/ newbies, don't you know the proper response?

Name: Anonymous 2008-11-07 16:45

- It is a type of program I don't expect people to have the motivation to pay for (it's a recipe program)
Also, if you insist on making your crap shareware, don't bother with anything but a simple serial number. If you think any kind of online or hardware based validation is not fundamentally a fucking stupid idea, I suggest killing yourself.

Name: Anonymous 2008-11-07 16:46

>>14
oh, yeah, let's spam memes instead of actually discussing

Name: Anonymous 2008-11-07 17:07

>>16
Are you new here? That's what we do

Name: Anonymous 2008-11-07 18:23

>>5
It's the hard drive model + serial number, which doesn't change during reformats or any filesystem activity at all.  Actually, I think it would be more than totally unlikely that a housewife would share her key with a friend.

I know crackers aren't worth fighting.  I'd probably open-source it at some point in the future.

My license would be per-hard drive.

>>6
They can't even read.

>>7
wat

>>9
Which is NOT your typical housewife.  Also, do you think a person with that ability will even be interested in this program?  I think it is unlikely.  If this was something gamers/hackers/programmers/4channers would typically want, then yeah I would expect it to be hacked to bits and hung out to dry in all warez realms.  I don't think such would waste their time with this.

>>15
You are in the gamer/hacker/programmer/4channer category and that is why you don't want to pay for it.  Me too.  I wouldn't pay for this program when I can (gasp?) write it myself, which I did.  But I'm seeking to exploit others that are not in this group.  Help me help you to help me not help others, okay?

Name: Anonymous 2008-11-07 18:45

I will, from this day forward, index all proprietary recipe programs and release hacks for each one.

You proprietary developers make me sick.

Name: Anonymous 2008-11-07 19:26

>>19
You couldn't hack a broken stump

Srs guys, I need 2k monies to feed my starving family

Name: Anonymous 2008-11-07 19:50

Your stupid housewives probably know about virtualization and the enterprise benefits it gives, so they will install it onto a VM and quickly defeat your carefully crafted scalable protection scheme (and by scheme, I don't mean the programming language).

Also, try explaining your typical housewife what a "per-hard drive license" is. These people buy a new computer every 3 months when the old one dies of AIDS.

Name: Anonymous 2008-11-07 20:07

>>1, I will replicate your proprietary functionality in a cheapass .NET program and steal your customers.

Name: Anonymous 2008-11-07 20:56

>>11,13
YHBT

Name: Anonymous 2008-11-07 23:22

>>21
Didn't think about that.  Thank you for making this productive.

>>22
It's in .NET

Name: Anonymous 2008-11-08 0:52

>>24
I meant, as Free Software. Then no one will buy your crapware.

Name: 15 2008-11-08 5:27

>>18
No, I've actually paid for all the non-free programs I have. It's just that there are billions of free recipe programs out there, and you will have a hard time getting paid for yours.

Name: Anonymous 2008-11-08 8:42

Dear >>1,
Your idiocy has provided me with several minutes of cheap entertainment and for that i thank you

Name: Anonymous 2008-11-08 8:50

An open source one will come along and be better than yours.

Name: Anonymous 2008-11-08 9:14

>>17
You might want to look at threads from 2007 or earlier

Name: Anonymous 2008-11-08 14:10

>>29
You might want to look at threads from 2008.

Name: Anonymous 2008-11-08 16:48

>>29
/prog/ is a meme shithole since 2006 you have to go back to 2005.

Name: Anonymous 2008-11-08 17:49

>>31

what the sepples are you talking about

Name: Dark Sussman 2008-11-08 17:56

(it's a recipe program)
If you used my proud and noble Algorithmic Language Scheme to make some retarded program for housewives I'm going to shove a cdr down your throat so hard that the recursion will rip you a new haxed anus.

Name: Anonymous 2008-11-08 20:32

Cunts like it rough. Use a USB dongle.

Name: Anonymous 2008-11-08 20:36

>>34
That's not enough! Use a license server. THAT will teach 'em.

Name: Anonymous 2008-11-08 23:06

Software does not want to be protected.

Information wants to be free.

Name: Anonymous 2008-11-09 7:23

OP here.  My girlfriend says you guys are all people who would be willing to work at Media Play for six dollars an hour.

Name: Anonymous 2008-11-09 8:13

>>37
Luxury.

Name: Anonymous 2008-11-09 8:52

I AM AN EXPERT SHAREWARE HAXXOR
Ify ou payme enough i will give you access to a private area of timestamps ;)

http://bayimg.com/image/oalgpaabn.jpg

Name: Anonymous 2008-11-09 9:24

>>30
Get out of here, Christopher.

Name: Anonymous 2008-11-09 9:28

>>40
Did you mean to post ``>>39
Get out of here, Christopher.''?

Name: Anonymous 2008-11-09 9:51

>>41
Did you mean to post “Did you mean to post “>>39
Get out of here, Christopher.”?”?

Name: Anonymous 2008-11-09 10:27

>>39
50% of all the trial period mac software use this method.
The remaining 50% are much more secure, and use the creation date of the plist instead.

Name: Anonymous 2008-11-09 18:38

>>42
Did you mean to post ">>39 is a FAG"?

Name: Anonymous 2008-11-09 19:04

OP here.  Let me tell you what really justifies me charging for this program.  Honestly, it's just a front end to manipulate and change a recipe database in realtime.  I have the database persisted to a plaintext format for easy parsing and processing using external utilites.  I didn't even store it in XML format so perl and unix commands like grep can process it easily.  I plan to make the specification for this format publicly known so anyone can develop programs to manipulate this database (known as a workspace in the program).

There are no secret or proprietary algorithms or anything.  It's just a manipulator and it computes costs of things, which are all trivial stuff.  Indeed anyone is free to develop a competing manipulator of said data.  Therefore by charging for this program I am not encroaching on the freedom of the community at all.  All they are paying for really is a polished front end.

Name: Anonymous 2008-11-09 19:44

>>45
Buy http://c.uisi.nr/, make it a free USER-GENERATED CONTENT AGILE WEB 2.0 PLATFORM, then live off PG's money with a buddy for a few years.

Name: Anonymous 2008-11-09 21:49

Name: Anonymous 2008-11-10 10:38

Protect it with the GNU GENERAL PUBLIC LICENSE. This way you protect FREEDOM.

Name: Anonymous 2008-11-10 11:33

OP here. Let me tell you what really justifies me charging for this program. Honestly, its just a front end to manipulate and change a recipe database in realtime.  I have the database persisted to a plaintext format for easy parsing and processing using external utilites.  I didnt even store it in XML format so perl and unix commands like grep can process it easily. I plan to make the specification for this format publicly known so anyone can develop programs to manipulate this database (known as a workspace in the program).

Name: Anonymous 2008-11-10 11:35

OP here. Let me tell you what really justifies me charging for this program. Honestly, it's just a front end to manipulate and change a recipe database in realtime. I have the database persisted to a plaintext format for easy parsing and processing using external utilites. I didn't even store it in XML format so perl and unix commands like grep can process it easily. I plan to make the specification for this format publicly known so anyone can develop programs to manipulate this database (known as a workspace in the program).

Name: Anonymous 2010-11-28 6:14

Name: Anonymous 2011-01-31 20:01

<-- check em dubz

Name: Anonymous 2011-02-03 4:47

Name: Anonymous 2013-09-01 13:53


They banged against the bars of the cell, lusting for my flesh. I saw against the rear wall and waited. After days the bars had bent forward, the pressure from bodies pressed to it had become too much. Tired and starving I was beginning to hear the rotting corpses speak. "shori you can?" and "hey doh ken" the meaning behind these phrases was lost on me. The zombies against the bars had gotten pressed through the bars like a grinder. I felt sick and would have wretched if there were anything in my stomach to expel. The bars creaked and the walls groaned. The cell collapse forward and a flood began to pour forward. Gnashing teeth, jagged claws, empty eyes, and dead souls. I stood my back against the cool jail cell wall. "shor you ken?" I responded "Tiger."

Name: Anonymous 2013-09-01 15:24


drink vodka from some other shitty country.

Don't change these.
Name: Email:
Entire Thread Thread List