Knut Lorenzen wrote:
Brian Rathbone schrieb dereinst (am 27.03.2006 21:16 Uhr) via
[EMAIL PROTECTED]:
Unfortunately this approach won't keep crackers from getting a copy of
your unprotected file, since you can copy the app while it's running,
True, but the "temporary" app could test the presence of the "mother" app.
Just a thought.
That is a good point. It's sad that we have to spend our time on such
endeavors, but software theft is a harsh reality. There have been
multiple discussions on this list and others about how tenacious
crackers can be, and how the time you invest in a protection scheme
often creates an attractive challenge for the crackers. With that said,
I think this approach combined with other methods could certainly make
the act of cracking your software more difficult.
On the Windows side of things, there are a number of good tools that can
"protect" and compress your executables, but unfortunatley I've yet to
find one that will work with RB created apps. I thought I saw someone
announce a RB executable file packer for Windows, but I can't seem to
find that app to test. I am going to start another thread on this
specific topic.
Best wishes,
Brian
_______________________________________________
Unsubscribe or switch delivery mode:
<http://www.realsoftware.com/support/listmanager/>
Search the archives of this list here:
<http://support.realsoftware.com/listarchives/lists.html>