- Posted by jbrown1050 at yahoo.com Nov 23, 2001
- 1854 views
On 0, aku at inbox.as wrote: > > > T> Bound programs are probably slightly more secure from crackers simply > T> because it's unusual.... > > > Rob, if the shrouded program decyrpted while running, can > crackers get the code (although variable names changed) by > reading directly from ex*.exe memory? It depends on how the program information is stored. Remember, sequences aren arrays. It is possible that Rob used a similar technique to store the program code, so that the data is not continuous. Non-continuous data would be harder to be read directly from memory. If, however, the data WAS stored in an array, then it would be easier to read the code. (Though still non-trivial, as you would need a powerful debugger and be a very good asm- or even machine-code reader, in order to find the data.) ========================================================= > > -- Linux User:190064 Linux Machine:84163 http://jbrown105.1avenue.com