Solved

protect shareware - replacing real names with bogus like "x3p2-_lde"

Posted on 2002-07-16
6
201 Views
Last Modified: 2010-04-04
Hello,

I want to protect my shareware and I found several solutions for it.

One of them was for example that one should replace string-/varnames etc. like "MyString1" by bogus like "C339_3&s.*5G" for example, because if your software gets hacked then it is less readable for the hacker.

But how about replacing all your names in your source by some random-entries? Does there already exist some readymade software which can do this?
0
Comment
Question by:delphiheaven
6 Comments
 
LVL 3

Accepted Solution

by:
smurff earned 25 total points
Comment Utility
This has been a topic of discussion many times. Stopping the cracker/hacker will be near impossible but if you want to try your idea then you can use an compression program called UPX you just drag n drop your .exe onto the upx and it will compress and encrypt your .exe

Yes there is ways to crack it but it is REALLY hard and takes hours.

Another way would be to put all your strings in a resource only dll maybe..... but UPX is really good and free!!!


Regards
Smurff
0
 
LVL 3

Expert Comment

by:smurff
Comment Utility
Sorry UPX can be found at http://upx.sourceforge.net/

regards
0
 
LVL 3

Expert Comment

by:smurff
Comment Utility
Any luck?
Regards
0
IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

 
LVL 17

Assisted Solution

by:Wim ten Brink
Wim ten Brink earned 25 total points
Comment Utility
Obscuring variable-names in your source is a bit useless unless you include debug-information in your application. First step in making it hack-proof is by compiling the project without debug information.
However, protecting software against illegal copying is quite hard and once one hacker cracks it, it becomes useless because the illegal version will be all over the world when that happens. And believe me, if someone thinks it's worth hacking, it will be hacked...
Personally, I think copy protection is often an expensive thing to work on if you want to keep it as secure as possible. Better just visit http://www.aspack.com/asprotect.htm and buy this tool, then spend time on the serious part: your application. If you look at the price of this product then I'd say it's worth it. Another product is http://www.crypto-central.com/slock/index.html and you might even combine both technologies. I have no real experience with these two but they seem to be secure enough in most situations.

Back to obscuring variable names... Why this doesn't work? Simple... These names aren't used in the binary output of the compiler. It doesn't matter if you call it a PageCaption or s655AD, the compiler just turns it into an address...
0
 

Expert Comment

by:CleanupPing
Comment Utility
delphiheaven:
This old question needs to be finalized -- accept an answer, split points, or get a refund.  For information on your options, please click here-> http:/help/closing.jsp#1
EXPERTS:
Post your closing recommendations!  No comment means you don't care.
0
 
LVL 5

Expert Comment

by:Lukasz Lach
Comment Utility
delphiheaven,
No comment has been added lately (18 days), so it's time to clean up this TA.
I will leave a recommendation in the Cleanup topic area for this question:

RECOMMENDATION: split points between smurff http:#7159115 and Workshop_Alex http:#7166011

Please leave any comments here within 7 days.

-- Please DO NOT accept this comment as an answer ! --

Thanks,

anAKiN
EE Cleanup Volunteer
0

Featured Post

Better Security Awareness With Threat Intelligence

See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

Join & Write a Comment

A lot of questions regard threads in Delphi.   One of the more specific questions is how to show progress of the thread.   Updating a progressbar from inside a thread is a mistake. A solution to this would be to send a synchronized message to the…
In my programming career I have only very rarely run into situations where operator overloading would be of any use in my work.  Normally those situations involved math with either overly large numbers (hundreds of thousands of digits or accuracy re…
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now