On 16 Sep 2006, at 15:31, Andy Dent wrote:

Ultimately an executable has to be executed.

At that point it has to be translated into instructions that run on the target machine. A sufficiently low-level debugger can be used to intercept these instructions.

However, the page you linked to does actually suggest this as a delaying tactic (nice link, thanks): "Use encryption of any description, a simple XOR will add about 5 minutes to a crackers progress, commercial and secure schemes like RSA/SHA/ECC etc. can add hours to a crackers progress, it is worth studying the theory of some of these algorithms if you use them and modifying them, since many of the algorithms use constants which can easily be searched for in a disassembly listing."

and, implying similar:

 "Pack your executable using a commercial or freeware packer"

I think the only way to really protect your app, is to make sure the source can't be traced. The only way I can think of, is with a hosted web application (you only have to make sure you secure your hosting server).


Best regards

Peter De Berdt

_______________________________________________
Unsubscribe or switch delivery mode:
<http://www.realsoftware.com/support/listmanager/>

Search the archives of this list here:
<http://support.realsoftware.com/listarchives/lists.html>

Reply via email to