Alex Rice wrote: > A particularly easy one to implement is to use a message digest (SHA, > or MD5) of a string that can be generated at run-time to compare with > the the user's digest key.
I've heard of this approach to determine if a software has been cracked: have some external component get the md5digest of your app file at boot, and compare it to the one from when you shipped the product. If it doesn't match then the software can just refuse to complete the boot. But of course this has its own vulnerabilities: if they can dsassemble the code for the md5 comparison, they can just as easily disable the routine that requires it. ;) -- Richard Gaskin Fourth World Media Corporation Developer of WebMerge 2.1: Publish any database on any site ___________________________________________________________ [EMAIL PROTECTED] http://www.FourthWorld.com Tel: 323-225-3717 AIM: FourthWorldInc _______________________________________________ use-revolution mailing list [EMAIL PROTECTED] http://lists.runrev.com/mailman/listinfo/use-revolution
