I want recompile PHP Source with Source encryption!

I have seem dificult work: recompile php source (or write extenstion like icupe, phpShield...)
to protect my php source
with myshelf encryption !

Where the position of code load phpcode file?

My idea is simple: After wirte phpcode, I will encrypt to a file
When php load this source to run, It will decrypt before run it!
redstar01Asked:
Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Scott MadeiraCommented:
Check this link for some options for code encryption.

http://www.seocompany.ca/software/free-encryption-software.html

0
Ray PaseurCommented:
Consider using ioncube. (Google search for it).
0
redstar01Author Commented:
yes, but ioncube may be cracked???
Because it is popular
0
Cloud Class® Course: Amazon Web Services - Basic

Are you thinking about creating an Amazon Web Services account for your business? Not sure where to start? In this course you’ll get an overview of the history of AWS and take a tour of their user interface.

Ray PaseurCommented:
Good point.  Show us how you have cracked any ioncube site, please.
0
redstar01Author Commented:
I'm using phpShield
But I search google and found seem some one can crack it?

And I think ioncube is the same?

(ZendGuard may be decompled, but it has 'Obscure'?)
0
Ray PaseurCommented:
Let's go back to the essence of this question.  Show us how you have cracked any ioncube site, please.  

The same can be said for phpShield.  Show us how you have cracked any phpShield site, please.

My point is simply this: IT security is not an absolute, it is a continuum, and the security methods that are used for nuclear launch codes, financial transactions, medical records or bowling scores are very different.   And the field is mushrooming: IT security is now a full-time four year college major at the University of Maryland.  A central issue in the course of study is the matter of determining what security measures are appropriate for the machinery, power supplies, communication lines, application and data.  None of those details are present in this question, so we cannot really give you an educated answer.

My recommendation remains the same.  Use ioncube.  And continue to use it until you find that someone has cracked it and stolen your code.  Then use something else.  Or reconsider the business model that requires you to keep your program code a secret.  There are plenty of open-source systems that have robust consultancies (cf: Red Hat).  The software does not need to be a secret.  If it provides good value, people will come to you asking for your help and advice.
0

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
crazedsanityCommented:
Well said, Ray, well said.
0
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Scripting Languages

From novice to tech pro — start learning today.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.