逆向工程的软件保护 [英] Software protection from reverse engineering

查看:83
本文介绍了逆向工程的软件保护的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

我想用一个加壳程序保护我的代码(用C/C ++编写),有很多,但是我没有发现它们之间的区别,您能帮我选择最好的代码吗(我知道有并不是完美的保护,但我想要一个不会轻易破解的可靠的保护).非常感谢

解决方案.

您现在发现的所有内容都可能在6个月内损坏.

最好推广您的品牌和专业知识并提供支持,以便人们为您提供产品而不是其他产品.


我要使用的保护器是IARP64 Pro .

它是由经验丰富的老饼干和数十个反向工程学专家-Lena151撰写的.大约4年前,向任何可能破解它的人提供了免费副本-我不知道迄今为止有没有赠送过一份!
这是在一个社区中提供的,该社区定期创建Adobe激活密钥,并几乎破坏了其他任何发行人的保护.

您可以在此处查看:软件百科-IARP64 Pro [ ^ ]

但最重要的-比您选择的保护器重要得多-不要自己动手!有需要的人会在一周之内破解它.将其留给由以其为生的人创造的产品的免费或付费版本.

我所链接的那个人使用的经验是在解开许多众多出版商使用的方案时获得的.混淆,压缩,虚拟机等.如果您想闯入,那确实是一件讨厌"的工作.


I want to protect my code (written in C/C++)by a packer, there are many,but I didn''t get the difference between them, can you help me to choose the best one (I know that there is no perfect protection, but I want a reliable one that won''t be cracked easily). Thanks a lot

解决方案

Anything a computer can execute can be reversed, admittedly it could take time for the hacker and you could make things more difficult but nothing can stop it completely.

Anything you find now will probably be broken in 6 months time.

It is better for you to promote your brand and expertise and support so people come to you for your product and not some one else.


The protector I''d be using would be IARP64 Pro.

It was written by a seasoned old cracker and author of dozens of reverse-engineering tutes - Lena151. About 4 years ago a free copy was offered to anybody that could crack it - I''m not aware of a single copy being given away to date!
This was offered in a community that regularly creates Adobe activation keygens and defeats pretty much any other publisher''s protection one cares to name.

You can check it out here: Softpedia - IARP64 Pro[^]

But most important of all - far more important than which protector you choose - DON''T ROLL YOUR OWN! This will be cracked in under a week by somebody that wants in. Leave it to a free or paid version of a product that is created by someone that makes a living from it.

The one I linked to uses the experience gained when unravelling the schemes used by many, many publishers. Obfuscation, compression, a virtual machine, etc, etc. It really is a ''nasty'' piece of work if you''d like to break in.


这篇关于逆向工程的软件保护的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆