Level Extreme platform
Subscription
Corporate profile
Products & Services
Support
Legal
Français
Update of WWF-VFP, a tool to protect from decompilations
Message
From
16/11/2001 14:14:47
Jorge Grundman
E.U.I.T. Telecom.
Madrid, Spain
 
 
To
14/11/2001 20:38:40
Adam Weisberg
Adam Weisberg Consulting
Athens, Ohio, United States
General information
Forum:
Visual FoxPro
Category:
Other
Miscellaneous
Thread ID:
00574338
Message ID:
00582882
Views:
162
>That's a good idea; at least it makes it harder. But anyone with your code can write a crack for it... Assuming you have a decompress function dc(), they just call dc() but then instead of executing the decompress code, they write it to disk... But at least it would make someone work a little harder than buying the existing package for decompilation. It really depends upon what you are trying to protect against...

The dc() about what you are talking patch a process loaded in memory. But do not simpe unpack the code, also is needed to order the bytes in the correct sequence. But there is two dc() functions with different passwords: one to decrypt and decompress the original password, and another one to decompress the original code. After that, is needed to order the code in the correct sequence and finally the loader patch the process in memory.

Sincerely,

Jorge Grundman
http://mp3.com/grundman
Previous
Reply
Map
View

Click here to load this message in the networking platform