Solved

protect shareware - replacing real names with bogus like "x3p2-_lde"

Posted on 2002-07-16
6
204 Views
Last Modified: 2010-04-04
Hello,

I want to protect my shareware and I found several solutions for it.

One of them was for example that one should replace string-/varnames etc. like "MyString1" by bogus like "C339_3&s.*5G" for example, because if your software gets hacked then it is less readable for the hacker.

But how about replacing all your names in your source by some random-entries? Does there already exist some readymade software which can do this?
0
Comment
Question by:delphiheaven
6 Comments
 
LVL 3

Accepted Solution

by:
smurff earned 25 total points
ID: 7159114
This has been a topic of discussion many times. Stopping the cracker/hacker will be near impossible but if you want to try your idea then you can use an compression program called UPX you just drag n drop your .exe onto the upx and it will compress and encrypt your .exe

Yes there is ways to crack it but it is REALLY hard and takes hours.

Another way would be to put all your strings in a resource only dll maybe..... but UPX is really good and free!!!


Regards
Smurff
0
 
LVL 3

Expert Comment

by:smurff
ID: 7159115
Sorry UPX can be found at http://upx.sourceforge.net/

regards
0
 
LVL 3

Expert Comment

by:smurff
ID: 7161830
Any luck?
Regards
0
Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 
LVL 17

Assisted Solution

by:Wim ten Brink
Wim ten Brink earned 25 total points
ID: 7166011
Obscuring variable-names in your source is a bit useless unless you include debug-information in your application. First step in making it hack-proof is by compiling the project without debug information.
However, protecting software against illegal copying is quite hard and once one hacker cracks it, it becomes useless because the illegal version will be all over the world when that happens. And believe me, if someone thinks it's worth hacking, it will be hacked...
Personally, I think copy protection is often an expensive thing to work on if you want to keep it as secure as possible. Better just visit http://www.aspack.com/asprotect.htm and buy this tool, then spend time on the serious part: your application. If you look at the price of this product then I'd say it's worth it. Another product is http://www.crypto-central.com/slock/index.html and you might even combine both technologies. I have no real experience with these two but they seem to be secure enough in most situations.

Back to obscuring variable names... Why this doesn't work? Simple... These names aren't used in the binary output of the compiler. It doesn't matter if you call it a PageCaption or s655AD, the compiler just turns it into an address...
0
 

Expert Comment

by:CleanupPing
ID: 9343052
delphiheaven:
This old question needs to be finalized -- accept an answer, split points, or get a refund.  For information on your options, please click here-> http:/help/closing.jsp#1 
EXPERTS:
Post your closing recommendations!  No comment means you don't care.
0
 
LVL 5

Expert Comment

by:Lukasz Lach
ID: 9460994
delphiheaven,
No comment has been added lately (18 days), so it's time to clean up this TA.
I will leave a recommendation in the Cleanup topic area for this question:

RECOMMENDATION: split points between smurff http:#7159115 and Workshop_Alex http:#7166011

Please leave any comments here within 7 days.

-- Please DO NOT accept this comment as an answer ! --

Thanks,

anAKiN
EE Cleanup Volunteer
0

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
When I am typing into a TEdit last word repeats 7 158
Magic Software info 18 142
LAN or WAN ? 11 105
When i run adoquery my application freezes 26 188
This article explains how to create forms/units independent of other forms/units object names in a delphi project. Have you ever created a form for user input in a Delphi project and then had the need to have that same form in a other Delphi proj…
In my programming career I have only very rarely run into situations where operator overloading would be of any use in my work.  Normally those situations involved math with either overly large numbers (hundreds of thousands of digits or accuracy re…
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

685 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question