Solved

Hide fragmented Key Codes in registry?

Posted on 2006-06-08
8
291 Views
Last Modified: 2010-04-17
It's been suggested to me to hide a fragmented key code (approx. 25 pieces) in the OS registry to prevent program piracy.

Q. Is it safe to write new sub values within the pre-existing Windows registry keys?

I thought this might be more stealth than creating entire new tracable keys and subkeys.

Opinions and advice needed..............
0
Comment
Question by:kvnsdr
  • 4
  • 3
8 Comments
 
LVL 1

Assisted Solution

by:MySt1k
MySt1k earned 50 total points
Comment Utility
this is security trough obscurity, might not work very well vs a good softice programmer...
While tracing where your application get this fragment, the ppl will eventually have acces to all fragments.

well, this is only my 2 cent...
i'll let other ppl give solutions.

good luck !
0
 
LVL 1

Author Comment

by:kvnsdr
Comment Utility
...good softice programmer?
0
 
LVL 3

Accepted Solution

by:
Mikeh926 earned 200 total points
Comment Utility
SoftIce is a debugging tool, commonly favoured by hackers/crackers.

Depends what you mean by "safe"!

Yes, it's fairly safe to go and stick your own keys amongst all of the window's keys as long as you pick obscure names so you don't go accidentally altering how windows works! You also would have to be carefull not to put a key somewhere a user might delete the entire branch, maybe because they are trying to remove an app or fix an error.

As for whether it's safe from hackers finding it, I take the view that it someone really wants to hack your code, and they are experienced enough, they probably will. I think you have to weigh up the ammount of effort you want to put into your protection vs the likelyhood that expert hackers will try and break it. I don't think any protection scheme will be totally secure ... but that's probably a discussion for another topic.

Mike.
0
 
LVL 1

Author Comment

by:kvnsdr
Comment Utility
I agree that determined theives cannot be stopped.

However, why simply give it to them by doing little or nothing.

I would guess that successful software companies probably change their licensing code often....

I think continual change is the answer..........
0
How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

 
LVL 3

Assisted Solution

by:Mikeh926
Mikeh926 earned 200 total points
Comment Utility
True, but when you analyse the problem in more detail, I don't think that you will find many people attempting to copy software directly from one PC to another. Most software creates so many registry and file entires, com objects, etc, that it's almost impossible to copy it to another PC. It's much easier just to copy the original installation CD or internet download exe. What you really want is a mechanism that either prevents that, or makes such a copy worthless. In our case, we have two different copy protection mechanisms, one is based upon a hardware dongle, the other is a form of internet activation where the software is locked to the specific PC that it's installed to. We also have mechanisms to detect if anyone has hacked the software, so we can change the system for the next version...

0
 
LVL 1

Author Comment

by:kvnsdr
Comment Utility
Do you think that Harddrive cloning is an issue?
0
 
LVL 3

Assisted Solution

by:Mikeh926
Mikeh926 earned 200 total points
Comment Utility
I think it depends on who the software is targetted for. If you have software that a school or business wants to copy it then they might install it once and clone the hard disk image to all the PC's on their network. This is a pretty standard way of deploying software in large corporations. In this case, you have to be carefull that your software protection doesn't make it so inconvenient for the legitimate customer that they device not to buy your software in the first place! I don't see most home users going to the lengths of hard disk cloning to get a copy from their mate. In any case, if you have access to a PC and the ability to clone the hard disk, you probably have access to the original media that the software was instaleld from. What is your distribution mechanism for the software? CD? Download?
0
 
LVL 1

Author Comment

by:kvnsdr
Comment Utility
Only download. All downloads require a proper login which inturn is required for latter purchase.

My target sales is corporation networks. So cloning may pose a threat.

You suggest very good points.......
0

Featured Post

6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
countHi challenge 25 84
oracle query help 18 74
Windows Service to Receive TCP Packets 4 30
Turning python script into an applet 12 32
A short article about a problem I had getting the GPS LocationListener working.
Whether you've completed a degree in computer sciences or you're a self-taught programmer, writing your first lines of code in the real world is always a challenge. Here are some of the most common pitfalls for new programmers.
Viewers will learn how to properly install Eclipse with the necessary JDK, and will take a look at an introductory Java program. Download Eclipse installation zip file: Extract files from zip file: Download and install JDK 8: Open Eclipse and …
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

8 Experts available now in Live!

Get 1:1 Help Now