cracking

My website got hacked... What should I do?

My dad called me today and said people going to his website were getting 168 viruses trying to download to their computers. He isn't technical at all, and built the whole thing with a WYSIWYG editor. I popped his site open and viewed the source, and there was a line of Javascript includes at the bottom of the source right before the clo...

how are serial generators / cracks developed?

I mean, I always was wondered about how the hell somebody can develop algorithms to break/cheat the constraints of legal use in many shareware programs out there. Just for curiosity. ...

Software protection for small vendors

This is a problem we all have to consider at some point. After many years and many approaches I tend to agree in general with the staterment: "For any protected software used by more than a few hundred people, you can find a cracked version. So far, every protection scheme can be tampered with." http://stackoverflow.com/questions/34301...

Have you ever used code virtualizer or vmprotect to protect from reverse engineering?

I know that there is no way to fully protect our code. I also know that if a user wants to crack our app, then he or she is not a user that would buy our app. I also know that it is better to improve our app.. instead of being afraid of anticracking techniques. I also know that there is no commercial tool that can protec our app.... I al...

Hacking your own application

I am a web developer that is very conscious of security and try and make my web applications as secure as possible. How ever I have started writing my own windows applications in C# and when it comes testing the security of my C# application, I am really only a novice. Just wondering if anyone has any good tutorials/readme's on how to ...

Hacking/cracking deontology

Let's say you recently discovered some major vulnerabilities in a couple of web sites that activate mainly in your country and are very powerful in their market. The vulnerabilities I'm talking about are as worse as letting me browse the admin interface with superadmin privileges. What would you do now? I'm thinking of something like: ...

Changing the program flow when running under a debugger

Is there any way of detecting that a debugger is running in memory? and here comes the on Form Load pseudocode. if debugger.IsRunning then Application.exit end if Edit: The original title was "Detecting an in memory debugger" ...

How to deal with user authentication and wrongful modification in scripting languages?

I'm building a centralized desktop application using Python/wxPython. One of the requirements is User authentication, which I'm trying to implement using LDAP (although this is not mandatory). Users of the system will be mechanical and electrical engineers making budgets, and the biggest problem would be industrial espionage. Its a comm...

Being a cracker nightmare!

Hi, I am trying to make a code hard to crack using Objective-C on a Mac. One of the things I have to do is to check to see if the application was cracked. I am new to Objective-C and Xcode and whatever way I imagine to test my application I always end in a basic test that can be patched easily. For example: suppose I am about to te...

Resource on basic client security measures

Does anyone know of any resources that describes some techniques for improving security on the client side of an application? I do not expect to make anything completely "hack-proof", as I understand that's a completely futile exercise - I merely want to give people a bit of a hard time trying to mess with the program contents, to dissua...

How can avoid to iphone application cracking ?

hi , i built an application for iphone and i want to avoid cracking my app ... like this : i donn't problem with running on jail broken iphone ! ...

Protecting a program from unauthorised use/"crackers"

I am writing a piece of software in C++ which is targeted at a market in which software is traditionally heavily cracked (or at least, attempted to be). I realise that nothing can be completely protected, however I feel that trying would be a good idea and also I think some of the specifics of the situation that I'm in might be helpful. ...

Secure Software License Usage Audit Log

Folks, We have an intriguing technical challenge. How to write a secure audit file that tracks usage of a software so license fees can be based on usage thereby making it more affordable to those who use it less. Specifically, TickZoom sells a alpha generation trading platform for hedge funds which presently costs $2,000/month to licen...

Debugging and Analyzing a Trojan

I'm interested in using something like OllyDbg to examine a program that potentially has Trojan-like characteristics. Does anyone know any good tutorials on how to do this safely? Basically the program is a "bot" for a video game, but I suspect that it has back doors and/or will upload information it gathers (such as passwords) to a re...

Decompiling Objective-C libraries

I've just finished a library in Objective-C that I compiled as a Static Library for distribution. I'd wanted to know what chances to get this decompiled are out there. Do you know any software that can do this? If so, how could I protect me better? EDIT: My static lib is made for iPhone / ARM I created an algorithm that depending o...

What is the Best way to create a Trial program ?

I need to create a simple application that doesn't work after 30 days. How can I do that ? Is there a way to use Trial program after 30 days ? ...

What is the best anti-crack scheme for your trial or subscription software?

Writing code takes time and effort and just like any other human being we need to live by making an income (save for the few that are actually self sustainable.) Here are 3 general schemes to make a living: Independent developers can offer a trial then purchase scheme. An alternative is an open source base application with pay extensio...

Quantum Computing and Encryption Breaking

I read a while back that Quantum Computers can break most types of hashing and encryption in use today in a very short amount of time(I believe it was mere minutes). How is it possible? I've tried reading articles about it but I get lost at the a quantum bit can be 1, 0, or something else. Can someone explain how this relates to cracking...

How To Extract .flv Stream from JW Player 5.1?

The problem is I've a slow internet connection, and the video doesn't buffer like in YouTube. Therefore I was wondering weather I can extract the url of the .flv file which is being streamed in JW Player and directly download it. Doing some preliminary research, I've found the following info: Main Video URL: http://ijf10.ilcannocchiale...

How secure is a PostgreSQL database if my server is stolen?

If I have a server with a database if top secret data in PostgreSQL and my password is practically impossible to crack (128 character string of all sorts of weird chars, generated by hand). The server password is also uncrackable in theory (basically, ignore the possibility of a password crack). Aside from a password crack, how easy is ...