Solved

protect shareware - replacing real names with bogus like "x3p2-_lde"

Posted on 2002-07-16
6
202 Views
Last Modified: 2010-04-04
Hello,

I want to protect my shareware and I found several solutions for it.

One of them was for example that one should replace string-/varnames etc. like "MyString1" by bogus like "C339_3&s.*5G" for example, because if your software gets hacked then it is less readable for the hacker.

But how about replacing all your names in your source by some random-entries? Does there already exist some readymade software which can do this?
0
Comment
Question by:delphiheaven
6 Comments
 
LVL 3

Accepted Solution

by:
smurff earned 25 total points
ID: 7159114
This has been a topic of discussion many times. Stopping the cracker/hacker will be near impossible but if you want to try your idea then you can use an compression program called UPX you just drag n drop your .exe onto the upx and it will compress and encrypt your .exe

Yes there is ways to crack it but it is REALLY hard and takes hours.

Another way would be to put all your strings in a resource only dll maybe..... but UPX is really good and free!!!


Regards
Smurff
0
 
LVL 3

Expert Comment

by:smurff
ID: 7159115
Sorry UPX can be found at http://upx.sourceforge.net/

regards
0
 
LVL 3

Expert Comment

by:smurff
ID: 7161830
Any luck?
Regards
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 
LVL 17

Assisted Solution

by:Wim ten Brink
Wim ten Brink earned 25 total points
ID: 7166011
Obscuring variable-names in your source is a bit useless unless you include debug-information in your application. First step in making it hack-proof is by compiling the project without debug information.
However, protecting software against illegal copying is quite hard and once one hacker cracks it, it becomes useless because the illegal version will be all over the world when that happens. And believe me, if someone thinks it's worth hacking, it will be hacked...
Personally, I think copy protection is often an expensive thing to work on if you want to keep it as secure as possible. Better just visit http://www.aspack.com/asprotect.htm and buy this tool, then spend time on the serious part: your application. If you look at the price of this product then I'd say it's worth it. Another product is http://www.crypto-central.com/slock/index.html and you might even combine both technologies. I have no real experience with these two but they seem to be secure enough in most situations.

Back to obscuring variable names... Why this doesn't work? Simple... These names aren't used in the binary output of the compiler. It doesn't matter if you call it a PageCaption or s655AD, the compiler just turns it into an address...
0
 

Expert Comment

by:CleanupPing
ID: 9343052
delphiheaven:
This old question needs to be finalized -- accept an answer, split points, or get a refund.  For information on your options, please click here-> http:/help/closing.jsp#1 
EXPERTS:
Post your closing recommendations!  No comment means you don't care.
0
 
LVL 5

Expert Comment

by:Lukasz Lach
ID: 9460994
delphiheaven,
No comment has been added lately (18 days), so it's time to clean up this TA.
I will leave a recommendation in the Cleanup topic area for this question:

RECOMMENDATION: split points between smurff http:#7159115 and Workshop_Alex http:#7166011

Please leave any comments here within 7 days.

-- Please DO NOT accept this comment as an answer ! --

Thanks,

anAKiN
EE Cleanup Volunteer
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Introduction The parallel port is a very commonly known port, it was widely used to connect a printer to the PC, if you look at the back of your computer, for those who don't have newer computers, there will be a port with 25 pins and a small print…
Have you ever had your Delphi form/application just hanging while waiting for data to load? This is the article to read if you want to learn some things about adding threads for data loading in the background. First, I'll setup a general applica…
This tutorial gives a high-level tour of the interface of Marketo (a marketing automation tool to help businesses track and engage prospective customers and drive them to purchase). You will see the main areas including Marketing Activities, Design …
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now