On Thu, 10 Jun 1999, Richard Hartman wrote:
>
> If you don't use a reg code but distribute full apps separately, you 
> can make certain that each one distributed is identifiable via some 
> sort of "fingerprint" (e.g. PGP signing).  You can't prevent him from
> distributing it, but you -can- trace it to him.

  and then what can you do? sue him?

  unless you get them to sign a declaration or something.. there is
  nothing you can do to him.. 

  full access apps:   - BAD, people can copy freely
  limited apps:       - GOOD (means people will be forced to buy),
                        BAD, if someone puts out a patch for it.

  either way there is nothing we can do to stop these guys.
  i am sure everyone on this list (those developers) has a program
  that has been patched or cracked on that damn website.

  if you are concerned about the crackers (and want to limit the
  cracking to only a limited few - who actually know what they are
  doing)..

    - disassemble your own code.. find the flaws.
    - change your code.. remove any possibility of a "hack"

  in the example of the "Boolean" function, gcc puts a NEG D0
  instruction in there so that it returns TRUE on sucess, change
  all your code that it expects a FALSE return value.. and then
  there will be NO code for them to patch (as easy).

  do people understand this? (probably best to see one of my
  previous posts with the assembler).

  so far so good for LodeRunner.. they have to think a bit now.
  - no crack yet (i am timing them)..

az.
--
Aaron Ardiri 
Lecturer                       http://www.hig.se/~ardiri/
University-College i G�vle     mailto:[EMAIL PROTECTED]
SE 801 76 G�vle SWEDEN       
Tel: +46 26 64 87 38           Fax: +46 26 64 87 88
Mob: +46 70 352 8192           A/H: +46 26 10 16 11

Reply via email to