Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

Protecting mah program

Name: Anonymous 2008-11-07 10:05

- I have written a program, I want people to pay for it
- It is a type of program I don't expect hackers to have motivation to hack (it's a recipe program)
- If the program doesn't receive a valid activation key, it goes into limited trial mode
- The activation key is the SHA1 hash of the installation key + a guid I picked.  They must enter this key to get out of trial mode.
- The installation key is the SHA1 hash of the hard drive model + serial number.  They get this and must email it to me with money.
- I don't expect typical users of this program to know how to spoof the HD serial number (lol females).
- Did I do this right?  Suggestions?

Name: Anonymous 2008-11-07 15:23

>>10
Are you fucking kidding me? You better be fucking kidding me. There are tools which can let you view and edit the bytecode, they can even get you back the source code. If an obfuscator is used, there are libraries (http://jakarta.apache.org/bcel/) to modify and step through classes at runtime.

I might just ask you to GTFO, if that's okay with you.

Name: Anonymous 2008-11-07 16:26

>>10
Java is even more bidirectional because it's bytecodes are so high-level, and near-perfect decompilers exist.

For C and C++ there are decompilers which can produce equivalent code (actually C++ is decompiled from C), but not for any arbitrary binary.

But you're not trying to understand the program, you're trying to change one little flow path.

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List