Level Extreme platform
Subscription
Corporate profile
Products & Services
Support
Legal
Français
How to protect be decompiled?
Message
From
30/12/2004 07:37:41
 
 
To
30/12/2004 05:39:36
General information
Forum:
Visual FoxPro
Category:
Other
Miscellaneous
Thread ID:
00972325
Message ID:
00973231
Views:
209
><snip>
>>>Like I said, the discussion of souce code and copy protection is about (a) what do you want to protect, (b) for how long, and (c) from who?
>>
>>You said: No, it is not. Inclining that it's better to use a product like Konxise.
>>I say: Someone is either hacking or not hacking at all. The hacker for sure will use tools to hack and the non-hacker will not hack, so the native 'encryption' is enough protection.
>
>
>Like I said, the discussion of souce code and copy protection is about (a) what do you want to protect, (b) for how long, and (c) from who?

Okay, it appears we are now in a LOOP. There is one thing that bothers me here. You seem to think that I don't understand you or don't want to understand you. You seem to think that I don't have a point here. However, I think that I do have a point here.

You are implicitly telling all readers: Hey, buy that external product!
I am telling readers: Don't underestimate the efficiency of the native 'encryption' and don't overestimate the efficiency of those external products.

To focus on your (c) of your abc: In my view there are only two kinds of users..
1) Those who hack. Nothing really will stop them from succeeding.
2) Those who don't hack. The external products are not more efficient here.
Groet,
Peter de Valença

Constructive frustration is the breeding ground of genius.
If there’s no willingness to moderate for the sake of good debate, then I have no willingness to debate at all.
Let's develop superb standards that will end the holy wars.
"There are three types of people: Alphas and Betas", said the beta decisively.
If you find this message rude or offensive or stupid, please take a step away from the keyboard and try to think calmly about an eventual a possible alternative explanation of my message.
Previous
Next
Reply
Map
View

Click here to load this message in the networking platform