软件破解、软件反编译及安全

Software Security methods

  1. Fixed Serial Number: In this method the software will ask for a
    serial number on installation or during the 1st run. Serial number
    could be distributed easily. Indeed the serial number is just to
    inform the user this is none free software and he should bought it.
  2. Activation Code: In this method the software will generate a machine
    id and required an activation code from the user which could be
    getting from the vendor. Cracking of the software may be performed
    by debugger or by partial decompiling.
  3. Internet Activation: Same as activation code put the activation will
    run through internet. Cracking may be done by injecting wrong
    interties in host file to forward the activation page to local or
    wrong page, or even by a custom DNS forwarder
  4. Dongle: the provider will provide a small hardware piece with could
    be detected by the software. The dongle will contains some info to
    be used for a special version or software. Cracking maybe done by
    hacking the communicating library between software and dangle.
  5. Protected CD: The installation can be run only from the original
    protected CD which maybe protected by laser generated bad sectors or
    some invalid contents or writing data after CD end mark. Cracking
    maybe done by coping the CD using special program or by cracking
    installation process.
  6. Flash USB memory: The software may use the physical number of the
    flash memory and compare it to database before run or write a part
    of the software code on none assigned area of the flash disk.
    Cracking may be done by hacking the software. After sell support:
    Some software provider provides a very good support so the buyer
    will not try to get cracked software.
  7. Direct installing method: some provider will install the software by
    a developing company employee and no install application is
    distributed.

Decompiling

  1. To decompile is to convert executable (ready-to-run) program code
    into some form of higher-level programming language.
  2. The resulting code can be read by a human.
  3. De-compilation is a type of reverse engineering that does the
    opposite of what a compiler does.
  4. The tool that accomplishes this is called a de-compiler.
  5. A similar tool, called a disassembler, translates object code into
    assembler language. De-compilation was first used in the 1960s to
    facilitate the migration of a program from one platform to another.
  6. De-compilation is not always successful.
  7. De-compilation is sometimes used unethically, to reproduce source
    code for reuse or adaptation without permission of the copyright
    holder.
  8. Programs can be designed to be resistant to de-compilation through
    protective means such as obfuscation.
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值