Solved

What do you say about this protection ?

Posted on 2002-06-10
11
155 Views
Last Modified: 2010-04-04
I found this tip on net :
http://www.delphifr.com/article.aspx?Val=317

What is your opinion ?
0
Comment
Question by:ginsonic
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
  • 2
  • +2
11 Comments
 
LVL 45

Expert Comment

by:aikimark
ID: 7069034
Since I don't read French, I am commenting on the apparent function of the Pascal code in your link.

While the use of an external file can/does provide a long encryption key (relative to the data to be encoded), you have provided the key for some user to decrypt the file.

You would have better/stronger encryption to seed the Delphi random number generator in both the encryptor and decryptor routines and use the resulting values to protect your data.
0
 
LVL 17

Accepted Solution

by:
inthe earned 50 total points
ID: 7069056
hi,
i dont read french but from the looks of it if someone was copying a cd with that protection  it would take them longer but all would be needed is to copy it to harddisk, jmp over the CheckIfOriginalCd calls ,and reburn a new master to make that technique no good.

the best thing to do is to use multiple amounts of these types of techniques to make it as difficult as possible to do so that potential "back-uppers" get annoyed and giveup..
0
 
LVL 45

Expert Comment

by:aikimark
ID: 7069218
ginsonic,

What do you have in mind?
Can you do some translation for us?

======================================
Did you hear about the Sony CD protection scheme that could be circumvented by blackening the outside edge with a felt-tip marker?  Needless to say, the protection was a joke and the CD player never made it to store shelves in America.  Neither Sony nor the music industry vendors were amused.
0
Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 
LVL 9

Author Comment

by:ginsonic
ID: 7070262
inthe, how can be copyed a corupted file ?
0
 
LVL 3

Expert Comment

by:smurff
ID: 7070434
ginsonic

No matter what TYPE of protection you use because at the end of the day you will have some lines of code that will compare a value of Registered or Not etc etc and that is easy to crack e.g.


:00403B85 8B4DE8                  mov ecx, dword ptr [ebp-18]
:00403B88 3B4D08                  cmp ecx, dword ptr [ebp+08]
:00403B8B 0F8387010000            jne 00403D18

All that has to be done is patch the jump or the memory address on startup.

Or in the instance of the code you suggest is that you patch the return val e.g.

:00403DA4 8BE5                    mov esp, ebp
:00403DA6 5D                      pop ebp
:00403DA7 C20400                  ret 0004

you just put ....

:00403DA4 8BE5                    mov ebp, 01
:00403DA6 5D                      pop ebp
:00403DA7 C20400                  ret 0004

I have looked into this a lot and theres not much you can do. My 2 pence
Regards
Smurff
0
 
LVL 5

Expert Comment

by:Gwena
ID: 7071350
You cannot protect the data on a cd unless you control the hardware it runs on.. ala DIVX at Circuit City



It's all a numbers game in real life anyway... a certain percentage of people will bootleg your program... lets say that 10,000 people will eventually pirate your app if you don't protect it at all.. well maybe 9000 of them are such cheap @#$%'s that they would NEVER buy it even if it only cost a nickle... so you can't possible lose anything on them anyway... so let them pirate it... what difference can if make?  and maybe they will praise the software to their friends and a few might actually buy it :-)

Of the 1000 that are left that would actually buy your app if it were not already being passed around all the warez groups maybe 900 would give up and buy it if you put a lot of simple protection schemes in it that popped up randomly... a hacker will find the first one and crack that... then upload it to alt.binaries.warez.im-so-smart
and then move on to crack the next application he comes across... and then a few week or months later the pirated software starts to fail when your 2nd piece of protection code kicks in... many of the pirates will now like your app so much that maybe they will buy it... after all.. they are using it everyday and the crack failed..and now they depend on it :-)


p.s. Just make the first protection scheme real easy to crack... that way you draw in more pirates quicker... and when the crack fails you may have many eager buyers ;-)

0
 
LVL 5

Expert Comment

by:Gwena
ID: 7071358
Oh!
Perhaps the saddest thing that can happen is that your program is so lame that nobody even bothers to crack it and upload it to the warez groups... imagine if nobody wanted your stuff... even for free :-/
0
 
LVL 9

Author Comment

by:ginsonic
ID: 7071981
I remember my first two components . I found these thanks to hazard ( I received a message from a warez group with a cracks list ). Just one week after release.

And I wish to say that I was glad to find my components on list :)
0
 
LVL 45

Expert Comment

by:aikimark
ID: 7072682
Are you writing a component or an application?  If you want to protect an application, you should look at some of the "wrapping" technologies.  I use one from Bit-Arts.
0
 
LVL 17

Expert Comment

by:inthe
ID: 7076413
>> how can be copyed a corupted file ?

via "bit" copying ,files are irrelevent at bit level.
nero etc shouldnt have a problem doing it.
0
 
LVL 9

Author Comment

by:ginsonic
ID: 7082884
Thanks to all for support,
Nick
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article explains how to create forms/units independent of other forms/units object names in a delphi project. Have you ever created a form for user input in a Delphi project and then had the need to have that same form in a other Delphi proj…
Introduction The parallel port is a very commonly known port, it was widely used to connect a printer to the PC, if you look at the back of your computer, for those who don't have newer computers, there will be a port with 25 pins and a small print…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
If you’ve ever visited a web page and noticed a cool font that you really liked the look of, but couldn’t figure out which font it was so that you could use it for your own work, then this video is for you! In this Micro Tutorial, you'll learn yo…

724 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question