protection

protect c++ output file(pe file) from editing using crc

How to protect c++ output file(pe file) from editing using crc(Cyclic Redundancy Check)? **Best Regards** ...

Protecting PHP classes from undesired instantiation?

I am working on a PHP library in which we will be supplying our clients with encrypted code. The code will include a main classes which they can instantiate that will handle license verification and expose methods for their use. The main class will instantiate several sub classes each contained in their own file. How can I prevent our...

Will using a streaming media server prevent RealPlayer Downloader from downloading FLV videos?

We are delivering FLV video to clients using progressive download. If a computer has real player downloader installed anyone can download these videos. How do we prevent this from happening? If we use a streaming media server like FMS, Wowza, FFServer prevent people from downloading videos? What other methods can be used? ...

Alternatives to mprotect()

The mprotect syscall protects the memory area within page boundary: int mprotect(void *addr, size_t len, int prot); Here len should be multiple of pagesize. Is there any way to protect only a few consecutive addresses, which are not aligned to page boundary i.e. len < pagesize ? ...

Can I use Truecrypt to protect an SQL 2008 database so that only my application can see the data?

I want to distribute an SQL 2008 database to a client and set it up so that the only way to access the data in it is through my application. Can I use Truecrypt for that? Can you think of any other solution? ...

Password protect Open XML Wordprocessing Document

I need to add basic password protection to an Open XML Wordprocessing document. I can either use the COM interface, which is very slow when I have a large number of documents to process; or I can put the data directly in the docx file under <w:settings> <w:documentProtection> which is very fast. However, looking at the requirements to en...

Apache folder protection methods vs cookie & database query for protecting website content and managing access rights. Which is best?

I am looking at user/subscription management software such as aMember Pro. This uses folder protection methods to prevent access to areas of the site. As such the PHP scripts require Apache (linux/unix). My webserver is IIS windows 2003 and I use a MySQL database to store user id and subscription status / access privileges. We really o...

How to implement copy protection of content in an open source application?

I have an idea for an open source app -- the app would be free, but I would charge a small fee for data that a customer would order. For instance, let's say I'm writing a map application. I'd give the app away, make it open-source, but I would like to sell various maps to individual users. Is there a way to protect the data in such a wa...

Class-behaviour with private fields

I encoutered a somewhat (at least for me) strange behaviour in a library I'm building; I have this method: public class Lib { private string field = "field"; public string Field { get { return field; } } public void Add(Lib lib) { string field = DoSomething(lib); Console.WriteLine(field); } protected string DoSo...

How To Make WCF Sessions More Secure?

let's say we have a WCF service like the one from msdn examples -- c#, calculatorservice, with all the service settings on default. if i were a hacker and i knew that calculatorservice was something important, that i want to make it stop working, i could simply hack the code for service references and make an application of my own that ...

Protecting a high value C# application with only one user

I have a single application -- written in C# -- which is used by only one user. I provide this software for a very high monthly fee (> $10,000). I'd like to protect this application against use by any other user and I'd like to be able to stop the one user from using the application if they stop paying the license fee. I know that the...

Securing WinForms Application suggestions

I've been looking for a simple key/license system for our users. Its partly to stop piracy (avoid users from sharing the application around) and the other half to track the number of 'licensed users' we have. I have already read a few good suggestions on SO but I'm curious as to how people have implemented the 30 day evaluation criteria....

Protecting Web Services

I've got a WebService project that we've created to expose some methods to our clients (specifically if they call one of the methods it will trigger an event on our servers) that they can call in their own C# projects (some clients will be doing web form apps and some will be doing it on their internal site). Due to the nature of the me...

Protecting a program from unauthorised use/"crackers"

I am writing a piece of software in C++ which is targeted at a market in which software is traditionally heavily cracked (or at least, attempted to be). I realise that nothing can be completely protected, however I feel that trying would be a good idea and also I think some of the specifics of the situation that I'm in might be helpful. ...

Audio encryption/protection

Other than coding, I spend alot of my time in a recording studio making music. I intend on selling my art both online and on cd, but I have one issue...protecting the audio file. I dont want people illegally distributing or making copies of my music so I need to protect it somehow. The one way that I've seen is to create my own player an...

Effective iPhone software copy protection solutions

Are there any effective copy protection solutions to protect iPhone software ? ...

Protecting the content of public/ in a Rails app.

I'm maintaining a Rails app that has content in the public/ folder that will now need to be protected by a login. We're considering moving those folders of files into a path outside of public/ and writing a Rails controller to serve up the content. Before we begin writing this, I was curious if anyone else has ran into this sort of pro...

Are there any good domain whois privacy services for dot name domains?

.name domains can be registered at the third level (ie: first.last.name can be registered in a way that last.name is shared [email protected] is forwarded, and separate people own different *.last.name domains). However so far the only registrars I've found that support third-level .name domains don't support whois privacy (putting their ...

How can I avoid SQL injection attacks?

Yesterday I was speaking with a developer, and he mentioned something about restricting the insertions on database field, like, strings such as -- (minus minus). At the same type, what I know is that is a good approach to escape HTML chars like <, > etc. Not --. Is this true? Do I have to worry about --, ++? Is it more like a myth or ol...

How to sell and protect software that has easily visible source (like Javascript)?

I have a unique idea for a browser based application that I'm considering developing and selling. The only problem is that it would all be HTML/Javascript based code. It is not a web-based service that I would host and others would use. It is something that clients would purchase and use either on their own local server or even on their ...