Hi Ilan,
I think that you are asking the wrong list. The denizens of this list
spend most of their time working to ensure the oposite of what you want.
- yba
On Thu, 13 Nov 2003, Ilan Finci wrote:
> Hi,
> The company I work with is creating executable code we give to potential
> clients to test.
>
> The code comes as either an executable or a shared library (with a given
> API the client use to connect it to his application).
>
> Is there a way to protect such executable/library, so it will be hard to
> do reverse engineering and find out what the algorithms we use? Of
> course, we protect ourself with patents, but we would like something in
> the level of protecting the code itself.
>
> Of course it is all done on linux (PPC or x86 version).
>
> Thanks,
> Ilan
>
>
> =================================================================
> To unsubscribe, send mail to [EMAIL PROTECTED] with
> the word "unsubscribe" in the message body, e.g., run the command
> echo unsubscribe | mail [EMAIL PROTECTED]
>
>
--
EE 77 7F 30 4A 64 2E C5 83 5F E7 49 A6 82 29 BA ~. .~ Tk Open Systems
=}------------------------------------------------ooO--U--Ooo------------{=
- [EMAIL PROTECTED] - tel: +972.2.679.5364, http://www.tkos.co.il -
=================================================================
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word "unsubscribe" in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]