![]() |
![]() |
![]() |
![]() |
![]() |
||||||||||
|
||||||||||||||
![]() |
#31
|
|||
|
|||
![]() I think we talk at cross purposes.
It is not my intention to offend or bitch someone at this board. If that should have happened then I'm sorry. Quote:
My question to you is: What do you mean by a good security system if sourcecode is open and changeable (patchable)? It makes no sense for me to have any security system inside OS code and I think that you mean that I shall code my own packer/protector or something like this. Is that right? Quote:
a) there is no real protection b) I shall code my own security system What's unclear for me: How does a security system you are talking about looks like? I hope I got you right this time and once again: I'm here to learn and not to argue. Thank you! |
#32
|
|||
|
|||
![]() Quote:
![]() Quote:
Quote:
The only possible protection is obfuscation, this doesn't prevent modifying the code its only to prevent people from being able to easily decompile and use your code, this same applies for packers/protectors. Your task is to code a licensing system that once its obfuscated is hard to analyze, another possibility is to only provide people with a down loadable DEMO copy accept of a trial and provide a retail (Full and also with a good licensing system) when someone buys your software. Another possibility is buying a commercial licensing system, but again u should extend this with self made checks or code otherwise is far to easy to analyze. And this licensing system should make use of public key encryption (RSA-1024 or ECC crypto for example) otherwise u basically provide the cracker with the encryption key needed to keygen the software. I hope this helps you understand the situation ![]() There is really no need in putting so much time in picking a obfuscator or a protecor ![]() Regards LibX |
#33
|
|||
|
|||
![]() Thanks LibX,
I think I see clear now. Using an asymmetric licensing system and having muliple checks is out of question. The missing piece is just how I protect the protection system. And there are only two choices: a protector or an obfuscator (or something that does both). However, the protection strength of these tools is obviously different and so I think it's not bad to ask which one does a good job and that's my aim here. Thanks for all your help and patience (I think this won't be my final post although it may sound like that ![]() And on one thing I have to insist: I'm definitly not wasting my time here ![]() Regards, Andu |
#34
|
|||
|
|||
![]() Quote:
Smartassembly, cheap, easy to use, no shit i dont need anyway or can get for free (like a decompiler) and the obfuscation is simply perfect never had a exe/dll that didn't run after protection. Regards LibX |
#35
|
|||
|
|||
![]() the same thing i can say about .net reactor in library mode. never had problems with it. the application mode sometimes requires adaptions on you project.
is the library-mode protection weaker than the smartassembly protection? .net reactor is much cheapter than smartassembly. so why do you use smartassembly over .net reactor? is it you natural aversion against the developer cause .net reactor contains stolen code? |
#36
|
|||
|
|||
![]() Quote:
But smartassembly is the most compatible obfuscator i know, i NEVER had a single assembly that didn't work after obfuscation. Also the 'protection' applied by .net reactor slows down the application also since its using overrated protection methods like the necrobits for example there is realy no need for such protections since they are easy enough to simply remove leaving the code decompilable again. And if u google a bit u will find articals about .net reactor written by developers also, and again they have no good word for this protection. (don't ask me where but i read 3 of them about a year ago) Regards LibX |
#37
|
|||
|
|||
![]() Hi LibX,
if it is not big secret, would you please to explain briefly how you know the way .Net Reactor merges the assemblies. I saw the source code which you posted. But until now I can not understand how you know that you should go that way to extract the assemblies to seperate files.
__________________
My site: http://rongchaua.net |
#38
|
|||
|
|||
![]() Quote:
|
#39
|
|||
|
|||
![]() there is a new beta of .net reactor available. the changelog says that the library protection core has changed. anyone tested unpacking yet?
|
#40
|
|||
|
|||
![]() only Obfuscation changed.
__________________
interest in .NET Reverse Engineering. Blog: http://jithook.blogspot.com/ .Net Assembly Rebuilder - a tool to rebuild dumped assemblies. Re-Max - a tool to unpack maxtocode protected assemblies. |