On Thu, 10 Jun 1999, Richard Hartman wrote:
>
> If you don't use a reg code but distribute full apps separately, you
> can make certain that each one distributed is identifiable via some
> sort of "fingerprint" (e.g. PGP signing). You can't prevent him from
> distributing it, but you -can- trace it to him.
and then what can you do? sue him?
unless you get them to sign a declaration or something.. there is
nothing you can do to him..
full access apps: - BAD, people can copy freely
limited apps: - GOOD (means people will be forced to buy),
BAD, if someone puts out a patch for it.
either way there is nothing we can do to stop these guys.
i am sure everyone on this list (those developers) has a program
that has been patched or cracked on that damn website.
if you are concerned about the crackers (and want to limit the
cracking to only a limited few - who actually know what they are
doing)..
- disassemble your own code.. find the flaws.
- change your code.. remove any possibility of a "hack"
in the example of the "Boolean" function, gcc puts a NEG D0
instruction in there so that it returns TRUE on sucess, change
all your code that it expects a FALSE return value.. and then
there will be NO code for them to patch (as easy).
do people understand this? (probably best to see one of my
previous posts with the assembler).
so far so good for LodeRunner.. they have to think a bit now.
- no crack yet (i am timing them)..
az.
--
Aaron Ardiri
Lecturer http://www.hig.se/~ardiri/
University-College i G�vle mailto:[EMAIL PROTECTED]
SE 801 76 G�vle SWEDEN
Tel: +46 26 64 87 38 Fax: +46 26 64 87 88
Mob: +46 70 352 8192 A/H: +46 26 10 16 11