Plateforme Level Extreme
Abonnement
Profil corporatif
Produits & Services
Support
Légal
English
Update of WWF-VFP, a tool to protect from decompilations
Message
De
16/11/2001 14:14:47
Jorge Grundman
E.U.I.T. Telecom.
Madrid, Espagne
 
 
À
14/11/2001 20:38:40
Adam Weisberg
Adam Weisberg Consulting
Athens, Ohio, États-Unis
Information générale
Forum:
Visual FoxPro
Catégorie:
Autre
Divers
Thread ID:
00574338
Message ID:
00582882
Vues:
164
>That's a good idea; at least it makes it harder. But anyone with your code can write a crack for it... Assuming you have a decompress function dc(), they just call dc() but then instead of executing the decompress code, they write it to disk... But at least it would make someone work a little harder than buying the existing package for decompilation. It really depends upon what you are trying to protect against...

The dc() about what you are talking patch a process loaded in memory. But do not simpe unpack the code, also is needed to order the bytes in the correct sequence. But there is two dc() functions with different passwords: one to decrypt and decompress the original password, and another one to decompress the original code. After that, is needed to order the code in the correct sequence and finally the loader patch the process in memory.

Sincerely,

Jorge Grundman
http://mp3.com/grundman
Précédent
Répondre
Fil
Voir

Click here to load this message in the networking platform