You may as well use some normal encryption using some lib, this zipped
method is a little odd. .. unless you want something to get kids into
cracking software, that smart kids will break open ?

(Which is fine too).

On 26 August 2014 14:20, diliup gabadamudalige <dili...@gmail.com> wrote:

> :) please don't get upset or angry. There is no need for that. :)
> i am writing this software ONLY for windows.
> it is a music teaching software.
> Thanks for the support. I have learnt a lot from these forums.
>
>
>
> On Tue, Aug 26, 2014 at 6:40 PM, Dan Uznanski <duznan...@gmail.com> wrote:
>
>> This is ridiculous.  Your proposed measures 1. Disrupt normal computer
>> operation far beyond any normal use case would dictate, and 2. Do not
>> prevent your stated unwanted behavior.  There are lots of programs out
>> there that capture screenshots and video without using the clipboard; on
>> some systems (mac, for one) these are the default.  You've demanded a blood
>> draw to get in the front door but the side entrance is wide open and
>> wheelchair accessible.
>>  On Aug 26, 2014 8:47 AM, "diliup gabadamudalige" <dili...@gmail.com>
>> wrote:
>>
>>> Hi Alec,
>>> No offence to you or to anyone who may think contrary, but disrupting
>>> computer operation is not what this does.Sometimes when I am writing things
>>> to my DVD burner windows doesn't respond normally. The normal operation of
>>> windows is disrupted. So what is the malware here? There are many other
>>> situations like that. The meaning of the word malicious is intent to harm.
>>> So malicious software is software is software written with the intention of
>>> harming other software or what ever. My program is a music teaching
>>> software and the reason I disable certain keys after the user is informed
>>> is to prevent certain unwanted actions like screen copying. SO if they want
>>> to capture any screens while running an education program which has
>>> informed them that they can't capture screens while it is running is a bit
>>> strange. Everything is returned to normal once the program is exited. :) So
>>> not malware.
>>>
>>>
>>>
>>>
>>> On Tue, Aug 26, 2014 at 5:41 PM, Alec Bennett <wrybr...@gmail.com>
>>> wrote:
>>>
>>>> doesn't fall into the category. :)
>>>>
>>>>
>>>> Not to beat a dead horse, but I respectfully disagree. Note the first
>>>> criteria in the first line of your linked article:
>>>>
>>>>  Malware, short for malicious software, is *any software used to
>>>>> disrupt computer operation*, gather sensitive information, or gain
>>>>> access to private computer systems.[1]
>>>>> <https://en.wikipedia.org/wiki/Malware#cite_note-1>
>>>>
>>>>
>>>> Your program clearly disrupts computer operation.
>>>>
>>>>
>>>>> Also was not referring to full screen mode.
>>>>
>>>>
>>>>  Not that it matters, but if you don't say what you're referring to,
>>>> its hard for people to point out how your analogy is probably wrong.
>>>>
>>>>
>>>>
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> On Mon, Aug 25, 2014 at 10:49 PM, diliup gabadamudalige <
>>>> dili...@gmail.com> wrote:
>>>>
>>>>> https://en.wikipedia.org/wiki/Malware
>>>>>
>>>>> doesn't fall into the category. :)
>>>>>
>>>>>
>>>>> On Tue, Aug 26, 2014 at 11:10 AM, Alec Bennett <wrybr...@gmail.com>
>>>>> wrote:
>>>>>
>>>>>> > some games lock up the os and you need to exit the game to have
>>>>>> access to the os.
>>>>>>
>>>>>> I think you're referring to fullscreen, which doesn't actually "lock
>>>>>> up the OS", it just takes over the screen, and all functions of the OS 
>>>>>> are
>>>>>> still as usual. And a critical difference is that fullscreen is
>>>>>> functionally important to the program, and is very obvious when its
>>>>>> happening, whereas disabling the clipboard is just, in my opinion,
>>>>>> malevolent.
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>> On Mon, Aug 25, 2014 at 10:32 PM, diliup gabadamudalige <
>>>>>> dili...@gmail.com> wrote:
>>>>>>
>>>>>>> It is stated in the opening screen.
>>>>>>> some games lock up the os and you need to exit the game to have
>>>>>>> access to the os. Does that make the game a malware?
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> On Tue, Aug 26, 2014 at 10:46 AM, Alec Bennett <wrybr...@gmail.com>
>>>>>>> wrote:
>>>>>>>
>>>>>>>> If you're clearing the Windows clipboard, you might want to let the
>>>>>>>> user know that. Very prominently. Otherwise your program is basically
>>>>>>>> malware in my opinion.
>>>>>>>>
>>>>>>>> It's still, in my opinion, malware, but at least you'd be warning
>>>>>>>> the user so they'd know that running your program will cripple their os
>>>>>>>> while it's running.
>>>>>>>>
>>>>>>>> Or just don't do silly things like clear the clipboard...
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>> On Aug 25, 2014, at 9:40 PM, diliup gabadamudalige <
>>>>>>>> dili...@gmail.com> wrote:
>>>>>>>>
>>>>>>>> Dear Vincent and Dan,
>>>>>>>>
>>>>>>>> All points taken positively. I'm still learning Python and all this
>>>>>>>> help and advice is making me write better and more pythonic code.
>>>>>>>>
>>>>>>>> I will leave this path and continue on the one I started traversing.
>>>>>>>>
>>>>>>>> I thank you all very much. May you be well.
>>>>>>>>
>>>>>>>>
>>>>>>>> On Tue, Aug 26, 2014 at 2:58 AM, Vincent Michel <
>>>>>>>> vxgmic...@gmail.com> wrote:
>>>>>>>>
>>>>>>>>> I agree with Dan.
>>>>>>>>>
>>>>>>>>> Also, there're some great answers over here:
>>>>>>>>>
>>>>>>>>> http://stackoverflow.com/questions/261638/how-do-i-protect-python-code
>>>>>>>>>
>>>>>>>>> For instance I like this one:
>>>>>>>>> """ Since no technical method can stop your customers from reading
>>>>>>>>> your code, you have to apply ordinary commercial methods.
>>>>>>>>> 1 - Licenses. Contracts. Terms and Conditions. This still works
>>>>>>>>> even
>>>>>>>>> when people can read the code. Note that some of your Python-based
>>>>>>>>> components may require that you pay fees before you sell software
>>>>>>>>> using those components. Also, some open-source licenses prohibit
>>>>>>>>> you
>>>>>>>>> from concealing the source or origins of that component.
>>>>>>>>> 2 - Offer significant value. If your stuff is so good -- at a price
>>>>>>>>> that is hard to refuse -- there's no incentive to waste time and
>>>>>>>>> money
>>>>>>>>> reverse engineering anything. Reverse engineering is expensive.
>>>>>>>>> Make
>>>>>>>>> your product slightly less expensive.
>>>>>>>>> 3 - Offer upgrades and enhancements that make any reverse
>>>>>>>>> engineering
>>>>>>>>> a bad idea. When the next release breaks their reverse engineering,
>>>>>>>>> there's no point. This can be carried to absurd extremes, but you
>>>>>>>>> should offer new features that make the next release more valuable
>>>>>>>>> than reverse engineering.
>>>>>>>>> 4 - Offer customization at rates so attractive that they'd rather
>>>>>>>>> pay
>>>>>>>>> you to build and support the enhancements.
>>>>>>>>> [...] """
>>>>>>>>>
>>>>>>>>> About py2exe, it is a really limited obfuscation cause it actually
>>>>>>>>> just stores the .pyc byte code files in a .zip archive. It means
>>>>>>>>> that
>>>>>>>>> you can unzip your .exe file and see what's inside, there's no
>>>>>>>>> protection at all. Though, the python byte code files offer a basic
>>>>>>>>> protection since you need to use some tools like uncompyle,
>>>>>>>>> pyretic or
>>>>>>>>> pycdc.
>>>>>>>>>
>>>>>>>>> " I also clear the windows clipboard on every run of the main
>>>>>>>>> program
>>>>>>>>> loop thus preventing the user from taking screen grabs with print
>>>>>>>>> screen."
>>>>>>>>> This seems so wrong man, what if the user is trying to copy/paste
>>>>>>>>> anything while your program is running on the background?
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> 2014-08-25 23:06 GMT+02:00 Dan Uznanski <duznan...@gmail.com>:
>>>>>>>>> > Why bother?  The average user won't care, the skilled users will
>>>>>>>>> see through
>>>>>>>>> > your ruse like it's plastic wrap, and the ones who care but
>>>>>>>>> aren't that good
>>>>>>>>> > will just find out what the skilled users did on the internet.
>>>>>>>>> The only
>>>>>>>>> > thing you do by adding obfuscation is make it a little bit more
>>>>>>>>> of a pain
>>>>>>>>> > for others to modify and improve your program, and make it a lot
>>>>>>>>> more of a
>>>>>>>>> > pain for you to test your program.
>>>>>>>>> >
>>>>>>>>> >
>>>>>>>>> > On Mon, Aug 25, 2014 at 4:04 PM, diliup gabadamudalige <
>>>>>>>>> dili...@gmail.com>
>>>>>>>>> > wrote:
>>>>>>>>> >>
>>>>>>>>> >> Thanks for the responses.
>>>>>>>>> >> Firstly I am a bit amused that everybody assumes that I am
>>>>>>>>> writing some
>>>>>>>>> >> kind of game. I never mentioned any game. Is it because of
>>>>>>>>> Pygame? :) :)
>>>>>>>>> >> I am using Pygame as my graphic interface because it is easy to
>>>>>>>>> display
>>>>>>>>> >> all graphics and music (with some MIDI) using Pygame.
>>>>>>>>> Incidentally I am
>>>>>>>>> >> writing a music teaching software.
>>>>>>>>> >>
>>>>>>>>> >> I use maketrans with a code string and then XOR the result
>>>>>>>>> using another
>>>>>>>>> >> string and then finally base64 it before writing it to disk. So
>>>>>>>>> all files
>>>>>>>>> >> look like -> CSVT121rI_OQt%BIc.@lm and even if someone duoble
>>>>>>>>> click or
>>>>>>>>> >> change the file ext they can not open the file in anything
>>>>>>>>> other than a text
>>>>>>>>> >> file editor.
>>>>>>>>> >>
>>>>>>>>> >> If we keep the worst case scenarios out my majority users would
>>>>>>>>> be average
>>>>>>>>> >> computer users and I doubt somone taking the trouble to reverse
>>>>>>>>> engineer
>>>>>>>>> >> this software which is absolutely unknown. Maybe they will do
>>>>>>>>> so if it gets
>>>>>>>>> >> world famous ( :-) ) but then I will hire a professional team
>>>>>>>>> to encrypt it
>>>>>>>>> >> or I will use a dongle protection. But right now I am trying to
>>>>>>>>> close the
>>>>>>>>> >> files from prying eyes. When compiled with py2exe all the py
>>>>>>>>> files are
>>>>>>>>> >> strung together and one exe file is formed but all the assets
>>>>>>>>> remain in the
>>>>>>>>> >> folder with the same names inside the folder where the exe is.
>>>>>>>>> So anyone can
>>>>>>>>> >> simply copy the files and the text inside. But this way they
>>>>>>>>> have no access
>>>>>>>>> >> as the zip file is encrypted. If they crack that open then all
>>>>>>>>> the files are
>>>>>>>>> >> encrypted and the encrypted password is in another py file
>>>>>>>>> inside the exe.
>>>>>>>>> >> Isn't this some kind of protection against no protection at
>>>>>>>>> all? I also
>>>>>>>>> >> clear the windows clipboard on every run of the main program
>>>>>>>>> loop thus
>>>>>>>>> >> preventing the user from taking screen grabs with print
>>>>>>>>> screen., These are
>>>>>>>>> >> taking into account THE THE AVERAGE USER.
>>>>>>>>> >> Considering the average user are the precautions I have taken
>>>>>>>>> fair? What
>>>>>>>>> >> do you think?
>>>>>>>>> >>
>>>>>>>>> >>
>>>>>>>>> >>
>>>>>>>>> >>
>>>>>>>>> >>
>>>>>>>>> >> On Mon, Aug 25, 2014 at 9:52 PM, Noel Garwick <
>>>>>>>>> noel.garw...@gmail.com>
>>>>>>>>> >> wrote:
>>>>>>>>> >>>
>>>>>>>>> >>> Diliup,
>>>>>>>>> >>>
>>>>>>>>> >>> My understanding is that anything you load into memory can be
>>>>>>>>> dumped.  So
>>>>>>>>> >>> if you're just using this to load all game assets at startup,
>>>>>>>>> people could
>>>>>>>>> >>> extract the assets by duping what the interpreter has loaded
>>>>>>>>> into memory
>>>>>>>>> >>> (the copies of the unencrypted files).
>>>>>>>>> >>>
>>>>>>>>> >>>
>>>>>>>>> >>> On Mon, Aug 25, 2014 at 11:52 AM, Vincent Michel <
>>>>>>>>> vxgmic...@gmail.com>
>>>>>>>>> >>> wrote:
>>>>>>>>> >>>>
>>>>>>>>> >>>> "the password is obfuscated and saved to a py file"
>>>>>>>>> >>>> I'm curious about this part, how would you do that?
>>>>>>>>> >>>> Do you plan to distribute only your byte code and hope that
>>>>>>>>> no one will
>>>>>>>>> >>>> reverse it?
>>>>>>>>> >>>>
>>>>>>>>> >>>> Also, why do you need a double encryption? If you want to
>>>>>>>>> prevent people
>>>>>>>>> >>>> from browsing your package to find the end screen or
>>>>>>>>> whatever, isn't
>>>>>>>>> >>>> your first encryption enough?
>>>>>>>>> >>>>
>>>>>>>>> >>>> Anyway I think it's an interesting question, I mean, how
>>>>>>>>> important is it
>>>>>>>>> >>>> to obfuscate game data.
>>>>>>>>> >>>>
>>>>>>>>> >>>> Vincent
>>>>>>>>> >>>>
>>>>>>>>> >>>> On Mon, 2014-08-25 at 19:38 +0530, diliup gabadamudalige
>>>>>>>>> wrote:
>>>>>>>>> >>>> > Having experimented with various methods to obfuscate
>>>>>>>>> image, audio and
>>>>>>>>> >>>> > text files, store them in a zip file pw protect and then
>>>>>>>>> retrieving on
>>>>>>>>> >>>> > demand  I finally did this.
>>>>>>>>> >>>> >
>>>>>>>>> >>>> >
>>>>>>>>> >>>> > coder= a long string with a lot of characters ( written in
>>>>>>>>> a separate
>>>>>>>>> >>>> > py file)
>>>>>>>>> >>>> >
>>>>>>>>> >>>> >
>>>>>>>>> >>>> > strA = XOR(from_disk.read(), coder)
>>>>>>>>> >>>> > str1 = XOR(strA,another_coder))
>>>>>>>>> >>>> >
>>>>>>>>> >>>> >
>>>>>>>>> >>>> > encryption twice to obfuscate even more.
>>>>>>>>> >>>> >
>>>>>>>>> >>>> >
>>>>>>>>> >>>> > with open(code_to_dir, "wb") as to_disk:
>>>>>>>>> >>>> > to_disk.write(str1)
>>>>>>>>> >>>> >
>>>>>>>>> >>>> >
>>>>>>>>> >>>> > then i used win rar to write these files to disk as a pw
>>>>>>>>> protected zip
>>>>>>>>> >>>> > file with store as the comp. method.
>>>>>>>>> >>>> >
>>>>>>>>> >>>> >
>>>>>>>>> >>>> > the password is obfuscated and saved to a py file
>>>>>>>>> >>>> >
>>>>>>>>> >>>> >
>>>>>>>>> >>>> > Retrieving the files from inside the zip file was the only
>>>>>>>>> hitch as
>>>>>>>>> >>>> > the python extract routine took a long time.
>>>>>>>>> >>>> >
>>>>>>>>> >>>> >
>>>>>>>>> >>>> > this was solved by a great package at
>>>>>>>>> >>>> > https://pypi.python.org/pypi/czipfile#downloads
>>>>>>>>> >>>> >
>>>>>>>>> >>>> >
>>>>>>>>> >>>> > retrieval time increase by nearly/more than/almost 200 %.
>>>>>>>>> >>>> >
>>>>>>>>> >>>> >
>>>>>>>>> >>>> > I would like to have your input on the above.
>>>>>>>>> >>>> >
>>>>>>>>> >>>> >
>>>>>>>>> >>>> >
>>>>>>>>> >>>> > Diliup Gabadamudalige
>>>>>>>>> >>>> >
>>>>>>>>> >>>> > http://www.diliupg.com
>>>>>>>>> >>>> > http://soft.diliupg.com/
>>>>>>>>> >>>> >
>>>>>>>>> >>>> >
>>>>>>>>> >>>> >
>>>>>>>>> **********************************************************************************************
>>>>>>>>> >>>> > This e-mail is confidential. It may also be legally
>>>>>>>>> privileged. If you
>>>>>>>>> >>>> > are not the intended recipient or have received it in
>>>>>>>>> error, please
>>>>>>>>> >>>> > delete it and all copies from your system and notify the
>>>>>>>>> sender
>>>>>>>>> >>>> > immediately by return e-mail. Any unauthorized reading,
>>>>>>>>> reproducing,
>>>>>>>>> >>>> > printing or further dissemination of this e-mail or its
>>>>>>>>> contents is
>>>>>>>>> >>>> > strictly prohibited and may be unlawful. Internet
>>>>>>>>> communications
>>>>>>>>> >>>> > cannot be guaranteed to be timely, secure, error or
>>>>>>>>> virus-free. The
>>>>>>>>> >>>> > sender does not accept liability for any errors or
>>>>>>>>> omissions.
>>>>>>>>> >>>> >
>>>>>>>>> >>>> >
>>>>>>>>> **********************************************************************************************
>>>>>>>>> >>>> >
>>>>>>>>> >>>> >
>>>>>>>>> >>>>
>>>>>>>>> >>>>
>>>>>>>>> >>>
>>>>>>>>> >>
>>>>>>>>> >>
>>>>>>>>> >>
>>>>>>>>> >> --
>>>>>>>>> >> Diliup Gabadamudalige
>>>>>>>>> >>
>>>>>>>>> >> http://www.diliupg.com
>>>>>>>>> >> http://soft.diliupg.com/
>>>>>>>>> >>
>>>>>>>>> >>
>>>>>>>>> >>
>>>>>>>>> **********************************************************************************************
>>>>>>>>> >> This e-mail is confidential. It may also be legally privileged.
>>>>>>>>> If you are
>>>>>>>>> >> not the intended recipient or have received it in error, please
>>>>>>>>> delete it
>>>>>>>>> >> and all copies from your system and notify the sender
>>>>>>>>> immediately by return
>>>>>>>>> >> e-mail. Any unauthorized reading, reproducing, printing or
>>>>>>>>> further
>>>>>>>>> >> dissemination of this e-mail or its contents is strictly
>>>>>>>>> prohibited and may
>>>>>>>>> >> be unlawful. Internet communications cannot be guaranteed to be
>>>>>>>>> timely,
>>>>>>>>> >> secure, error or virus-free. The sender does not accept
>>>>>>>>> liability for any
>>>>>>>>> >> errors or omissions.
>>>>>>>>> >>
>>>>>>>>> >>
>>>>>>>>> **********************************************************************************************
>>>>>>>>> >>
>>>>>>>>> >
>>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>> --
>>>>>>>> Diliup Gabadamudalige
>>>>>>>>
>>>>>>>> http://www.diliupg.com
>>>>>>>> http://soft.diliupg.com/
>>>>>>>>
>>>>>>>>
>>>>>>>> **********************************************************************************************
>>>>>>>> This e-mail is confidential. It may also be legally privileged. If
>>>>>>>> you are not the intended recipient or have received it in error, please
>>>>>>>> delete it and all copies from your system and notify the sender 
>>>>>>>> immediately
>>>>>>>> by return e-mail. Any unauthorized reading, reproducing, printing or
>>>>>>>> further dissemination of this e-mail or its contents is strictly 
>>>>>>>> prohibited
>>>>>>>> and may be unlawful. Internet communications cannot be guaranteed to be
>>>>>>>> timely, secure, error or virus-free. The sender does not accept 
>>>>>>>> liability
>>>>>>>> for any errors or omissions.
>>>>>>>>
>>>>>>>> **********************************************************************************************
>>>>>>>>
>>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> --
>>>>>>> Diliup Gabadamudalige
>>>>>>>
>>>>>>> http://www.diliupg.com
>>>>>>> http://soft.diliupg.com/
>>>>>>>
>>>>>>>
>>>>>>> **********************************************************************************************
>>>>>>> This e-mail is confidential. It may also be legally privileged. If
>>>>>>> you are not the intended recipient or have received it in error, please
>>>>>>> delete it and all copies from your system and notify the sender 
>>>>>>> immediately
>>>>>>> by return e-mail. Any unauthorized reading, reproducing, printing or
>>>>>>> further dissemination of this e-mail or its contents is strictly 
>>>>>>> prohibited
>>>>>>> and may be unlawful. Internet communications cannot be guaranteed to be
>>>>>>> timely, secure, error or virus-free. The sender does not accept 
>>>>>>> liability
>>>>>>> for any errors or omissions.
>>>>>>>
>>>>>>> **********************************************************************************************
>>>>>>>
>>>>>>>
>>>>>>
>>>>>
>>>>>
>>>>> --
>>>>> Diliup Gabadamudalige
>>>>>
>>>>> http://www.diliupg.com
>>>>> http://soft.diliupg.com/
>>>>>
>>>>>
>>>>> **********************************************************************************************
>>>>> This e-mail is confidential. It may also be legally privileged. If you
>>>>> are not the intended recipient or have received it in error, please delete
>>>>> it and all copies from your system and notify the sender immediately by
>>>>> return e-mail. Any unauthorized reading, reproducing, printing or further
>>>>> dissemination of this e-mail or its contents is strictly prohibited and 
>>>>> may
>>>>> be unlawful. Internet communications cannot be guaranteed to be timely,
>>>>> secure, error or virus-free. The sender does not accept liability for any
>>>>> errors or omissions.
>>>>>
>>>>> **********************************************************************************************
>>>>>
>>>>>
>>>>
>>>
>>>
>>> --
>>> Diliup Gabadamudalige
>>>
>>> http://www.diliupg.com
>>> http://soft.diliupg.com/
>>>
>>>
>>> **********************************************************************************************
>>> This e-mail is confidential. It may also be legally privileged. If you
>>> are not the intended recipient or have received it in error, please delete
>>> it and all copies from your system and notify the sender immediately by
>>> return e-mail. Any unauthorized reading, reproducing, printing or further
>>> dissemination of this e-mail or its contents is strictly prohibited and may
>>> be unlawful. Internet communications cannot be guaranteed to be timely,
>>> secure, error or virus-free. The sender does not accept liability for any
>>> errors or omissions.
>>>
>>> **********************************************************************************************
>>>
>>>
>
>
> --
> Diliup Gabadamudalige
>
> http://www.diliupg.com
> http://soft.diliupg.com/
>
>
> **********************************************************************************************
> This e-mail is confidential. It may also be legally privileged. If you are
> not the intended recipient or have received it in error, please delete it
> and all copies from your system and notify the sender immediately by return
> e-mail. Any unauthorized reading, reproducing, printing or further
> dissemination of this e-mail or its contents is strictly prohibited and may
> be unlawful. Internet communications cannot be guaranteed to be timely,
> secure, error or virus-free. The sender does not accept liability for any
> errors or omissions.
>
> **********************************************************************************************
>
>

Reply via email to