protection

Piracy protection using USB based hardware solution

Hi, i want to protect my Java product by using some USB-based authentication and password management solution like you can buy it here: aladdin This mean that you have to connect a USB stick with a special software on it, before you can start your application. I would like to here some experience of users which have used hardware like ...

Consensus on software license protection?

Is there any generally accepted guidelines as to when and how often to check with a license server that the license is still active? Edit: For clarification, the software I am dealing with would have expiration. It would be necessary to check at least each time the application is launched. ...

How effective is obfuscation?

A different question, i.e. Best .NET obfuscation tools/strategy, asks whether obfuscation is easy to implement using tools. My question though is, is obfuscation effective? In a comment replying to this answer, someone said that "if you're worried about source theft ... obfuscation is almost trivial to a real cracker". I've looked at t...

net reactor & clickonce deployment

After building our VB.NET .exe it is then obfuscated using the 3rd-party .NET Reactor utility before the output of that is included within a VS2005 deployment project. Is there a way of replacing the .exe with the scrambled version prior to then publishing using click-once ? Has anyone managed to deploy with click once, a net reactor pr...

What antidebug protection software for exe-files do you know? What is the best?

We used Themida, but it seems that Themida is no longer the strongest protection way today... What protection software for exe files do you know? What is the best? ...

Protect pictures, how to?

I am using asp.net and my users need to upload private pictures to my server. This pictures cannot in anyway get spread so I need to protect them in some way. What is the easiest way to protect them from public use so only the authorized user can reach them? Thanks! ...

How to prevent resale of PHP source?

Do you have a strategy for this? If I sell a web-system to a client and in accordance with the legal agreement, the customer is not allowed to sell it to others, how can I be sure he doesn't do that anyway? My first idea is some sort of key that must be in the root directory, and that file is only valid for that specific domain. Other ...

Protect folder from external requests

Hi, Im working with asp.net 2.0, and i have a folder into my application path ~/Data/ with some .mdb files. I would like to protect this folder from external request like http://www.whatever.com/Data/whatever.mdb But i would need to give any permission to my application, cause im using OleDBConnections agains the ~/Data/ Path. What ...

flood protection system

does do you design a comment flooding protection system like the one stackoverflow has? what should you be looking for? and record? ...

Question about paypal buyer protection

Hi, I have a basic question about the paypal API. Say I make the connection between a buyer (let's call him Adam) and seller (call him Joe), and send Adam to a paypal purchase page - where he's buying directly from Joe (I just make an the connection, I don't handle the cash).Joe turns out to be a fraud. He never sends the product. Is Ada...

Protecting media files for embedded Flash Player

For a Flash Player embedded in a site (think MySpace, for instance), how are the files concealed from the user so that he is not able to just download them? I am assuming that given the flash player, running client-side, is able to access the files, they are in fact also downloadable if you know how. But how do sites like MySpace or You...

Eziriz Intellilock on Vista 64 bits

Hi all, I'm using Eziriz Intellilock to protect a .NET windows application. The application targets .NET 2.0 and is built with "Any CPU" target. When it's unlocked it works fine in both 32bit and 64bit Vista. However, when I lock it with Eziriz Intellilock, I can only run the locked version in 32bit Vista. When trying to run in Vista 64...

How to improve protection on a MS Access MDB besides password protection?

Hi guys, i have a mdb access which is password protected but that can be easily cracked by a free tool found in google within like 1second. Besides paying for some expensive tools, is there a good way in how to protect a ms access databse file? I'm thinking of encrypting it then via a dll to decrypt it, get some data, and pass it to a th...

Is it possible to use .NET Reactor with ClickOnce deployment?

After reading this post and encountering the same issue (when attempting to build the manifests): MSB3171: Problem generating manifest. Could not load file or assembly or one of its dependencies. An attempt was made to load a program with an incorrect format. I would like to know if anyone has had success using .NET Reactor (Encryptio...

Using Prototype's Class.create to define private/protected properties and methods

There is a good generalized method for defining private and protected properties and methods in Javascript, here on the site. However, the current version of Prototype (1.6.0) doesn't have a built-in way to define them through its Class.create() syntax. I'm curious what the best practices are when developers want to define private and p...

Javascript protection

Hello, I know this is kind of stupid, but I need to protect a javascript, in a sense that I wish to add as much security as possible so that it is not pirated. Well, because it the core component of the system. I plan to use YUI compressor to compress and obfuscate it. But I would also like to add a protection which checks the domain,...

Where does an application store "I'm deactivated" on Windows?

Applications often have registration keys. It can arguably be placed in a file or in the registry. Sometimes, an application is deactivated by entry of another key, or the passing of a date, etc. Where can one safely store such information about an application be deactivated? A file isn't the answer; a backup copy can be restored to d...

Embed Identification Information into a file

Hello, I am wondering if it is possible in someway, to secretly embed information such as the purchase id in a file, so that if a file is being distributed, I know which purchase id it is. Something like MD5 + I don't know what. Something like steganography. Thank you for your time. ...

Protect yourself against Dos attacks

This might be something more suited for Serverfault, but many webdevelopers who come only here will probably benefit from possible answers to this question. The question is: How do you effectively protect yourself against Denial Of Service attacks against your webserver? I asked myself this after reading this article: http://isc.sans.o...

Offline view of dynamic content?

I want to view dynamic contents (flash games, online transaction...etc) offline. For example, I finish level 1 of this cool flash RPG game. I go offline and play the level again. Or, I make a purchase. And make the purchase again offline. Of course this won't do anything. It will be strictly for demonstration purpose. Or, I watch a ...