new topic     » goto parent     » topic index » view thread      » older message » newer message

On  0, aku at inbox.as wrote:
>
>
> T> Bound programs are probably slightly more secure
from crackers simply
> T> because it's unusual....
>
>
> Rob, if the shrouded program decyrpted while
running, can
> crackers get the code (although variable names
changed) by
> reading directly from ex*.exe memory?
 
It depends on how the program information is stored.
Remember, sequences aren
arrays. It is possible that Rob used a similar
technique to store the program
code, so that the data is not continuous.
Non-continuous data would be
harder to be read directly from memory.
 
If, however, the data WAS stored in an array, then it
would be easier
to read the code. (Though still non-trivial, as you
would need a powerful
debugger and be a very good asm- or even machine-code
reader, in order to
find the data.)
 
=========================================================
>
>
 
--
Linux User:190064
Linux Machine:84163
http://jbrown105.1avenue.com

new topic     » goto parent     » topic index » view thread      » older message » newer message

Search



Quick Links

User menu

Not signed in.

Misc Menu