Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
2Activity
0 of .
Results for:
No results containing your search query
P. 1
Crackproof Your Software (No Starch-2002)

Crackproof Your Software (No Starch-2002)

Ratings: (0)|Views: 57|Likes:
Published by Dhruv Jain
Uploaded by Hack Archives - http://undergroundlegacy.co.cc -
Uploaded by Hack Archives - http://undergroundlegacy.co.cc -

More info:

Published by: Dhruv Jain on Mar 19, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

01/16/2013

pdf

text

original

 
Crackproof Your Software
 
Table of Contents
Crackproof Your Software—The Best Ways to Protect Your Software Against Crackers....................1Introduction....................................................................................................................................................3
Protection as a Deterrent.....................................................................................................................3Working with Assembler......................................................................................................................3Publishing Cracker Tricks....................................................................................................................3
Chapter 1: Basics..........................................................................................................................................5
Why Crackers Crack............................................................................................................................5How Crackers Crack: Debuggers and Disassemblers.........................................................................5Debuggers.....................................................................................................................................5Disassemblers...............................................................................................................................5Decompilers...................................................................................................................................5The Most Frequent Protection Failures...............................................................................................6
Chapter 2: Cracking Tools............................................................................................................................7
Overview..............................................................................................................................................7SoftICE Basics.....................................................................................................................................8Key Commands...........................................................................................................................10The BPX Command.....................................................................................................................10The BPR Switch...........................................................................................................................10The BPM Switch..........................................................................................................................10Display Commands......................................................................................................................11
Chapter 3: The Basic Types of Software Protection................................................................................12
Registration−Number (Serial−Number) Protection............................................................................12Registration Number Is Always the Same...................................................................................12Registration Number Changes in Accordance with Entered Information.....................................13Registration Number Changes in Accordance with the User's Computer...................................14Registration−Number Protection in Visual Basic Programs.........................................................15How VB4 Programs Are Cracked................................................................................................16Registration Number Is Checked Online.....................................................................................18Time−Limited Programs....................................................................................................................21Time Limit Is Removed Once the Correct Registration Number Is Entered................................21Time Limit Is Removed Once a Registration Key File (.REG) Is Entered....................................22Time Limit Cannot Be Removed; User Must Buy the Full Program.............................................22Time Limit Is Contained in a Visual Basic Program.....................................................................23Time Limit Applies to a Certain Number of Starts........................................................................23Registration−File (KEY File) Protection.............................................................................................24Some Program Functions Are Blocked Without the Correct Registration File.............................24Program Is Time−Limited Without the Correct Registration File..................................................25Hardware−Key (Dongle) Protection...................................................................................................25Program Cannot Be Started Without the Hardware Key..............................................................25Some Functions Are Limited Without the Hardware Key.............................................................26HASP Hardware Keys.................................................................................................................27Sentinel Hardware Keys..............................................................................................................32
Chapter 4: CD Protection Tricks................................................................................................................33
Overview............................................................................................................................................33How CD−Checkers Work...................................................................................................................33CD Protection Software.....................................................................................................................34CD−Cops.....................................................................................................................................34DiscGuard....................................................................................................................................35LaserLock....................................................................................................................................351

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->