Knut Lorenzen wrote:

Brian Rathbone schrieb dereinst (am 27.03.2006 21:16 Uhr) via
[EMAIL PROTECTED]:

Unfortunately this approach won't keep crackers from getting a copy of
your unprotected file, since you can copy the app while it's running,

True, but the "temporary" app could test the presence of the "mother" app.

Just a thought.
That is a good point. It's sad that we have to spend our time on such endeavors, but software theft is a harsh reality. There have been multiple discussions on this list and others about how tenacious crackers can be, and how the time you invest in a protection scheme often creates an attractive challenge for the crackers. With that said, I think this approach combined with other methods could certainly make the act of cracking your software more difficult.

On the Windows side of things, there are a number of good tools that can "protect" and compress your executables, but unfortunatley I've yet to find one that will work with RB created apps. I thought I saw someone announce a RB executable file packer for Windows, but I can't seem to find that app to test. I am going to start another thread on this specific topic.

Best wishes,

Brian
_______________________________________________
Unsubscribe or switch delivery mode:
<http://www.realsoftware.com/support/listmanager/>

Search the archives of this list here:
<http://support.realsoftware.com/listarchives/lists.html>

Reply via email to