About Trade procedure Protection

Source: Internet
Author: User
Tags php database
About Business Process Protection
Which friend of the altar has experience in this field,

The program is authorized before it can be used, and is not open source.

Now Zend can be cracked after encryption?


------Solution--------------------
Encryption requires decryption of environment support, installation is a problem
What if the buyer uses a rented space and the gateway doesn't allow you to install it?

I would suggest that you release the code in compact format with partial scrambling (all scrambling runs down too much)
Few people are interested in studying the code.

Authorization requires certification, where do you plan to make the certification?
------Solution--------------------
Self-open backstage to sell services on the line, the host does not give people black your code will not leak out ...
------Solution--------------------
If you have a specific customer object, it is recommended to mix programming, some key parts do not use open source program code
------Solution--------------------
Post-encryption programs that can spread scalping
Unless the encryption and decryption software is private to you, make a fortune

Only allow programs to run on servers that specify IP addresses
Certification information is written directly into the program, leaving the specific environment can not be used

------Solution--------------------
It's hard ... I am in the Desktop program encryption for many years (not research encryption, is encryption program), 32 bit is also difficult, but 32 have a lot of international shell or very crest matter, Crest matter is because can prevent those level not high small cracker, really hit Daniel in their eyes is a lump.

Then you should try Zend that thing ... In addition to that seemingly there are some encryption of DLL control, that should not be so easy to solve.


------Solution--------------------
Process is this, so the key or you say the encryption, no encryption others read your writing, as long as the algorithm can be reversed out of the register machine.
Come on, hahaha, why don't you write a whole set of things for us? Provides authorization authentication for encryption.

Explore

The authentication information is written directly in the program.
Isn't that easy to crack?

If you do a monthly calculation, you have to renew something ...

I have some ideas right now,
The user's server requests an authorization code for the specified our API return program, which has a record usage period, expires or is not allowed in the IP request program to exit directly, or is not available.

I don't know what the feasibility is,

Finally still feel should be encryption this link, do not encrypt, pure PHP code is still easy to be cracked.


Reference 7 Floor ...

------Solution--------------------
It used to be useful, and I went after someone else's code. It's not a new version, it's not clear what the situation is.
discuss

That is the encryption problem, Zend before there was cracked news, I do not know how now.

Also think of a procedure is PHP call C program to do certain parts of the calculation, do not know whether it will be anti-compilation or something.


Reference:

It's hard ... I am in the Desktop program encryption for many years (not research encryption, is encryption program), 32 bit is also difficult, but 32 have a lot of international shell or very crest matter, Crest matter is because can prevent those level not high small cracker, really hit Daniel in their eyes is a lump ....

------Solution--------------------
discuss

That is the encryption problem, Zend before there was cracked news, I do not know how now.

Also think of a procedure is PHP call C program to do certain parts of the calculation, do not know whether it will be anti-compilation or something.

------Solution--------------------
Second solution ... A fool's style of ...
At that time, someone had PHP written as a desktop tool ... Your sister's still need someone else to put on the desktop apache+php database is not estimated to want to install a MySQL is too painful, with SQLite. It was because I wanted to analyze the data transmission principle of that thing and then I went to the solution.



discuss

has not been to engage in this aspect, do not understand Ah, the general source also do not engage in these ...


You also go to other people's source ha.

Did you finally solve it?


Reference:

It used to be useful, and I went after someone else's code. It's not a new version, it's not clear what the situation is.
Reference:

That is the encryption problem, Zend before there was cracked news, I do not know how now.

Also think of one way is PHP call C program to do some department ...

------Solution--------------------
There is really no good way ...
can only be low-hand anti-master ....

I think the general use of pirated (cough, is that the server side, the client's things, cough cough) is not what possible potential users ... If he had been stopped, he would have been tempted to find someone else to resist rather than pay for it.

Speed up their own updates, who installed the pirated, call the past .... We have upgraded to YY version, you are still xx version ... We have solved nnn bug, add mmm new function .... Wait a minute
------Solution--------------------
Sell services, don't sell products.
------Solution--------------------
No team and no brokers, how to sell the service?
  • Contact Us

    The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

    If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

    A Free Trial That Lets You Build Big!

    Start building with 50+ products and up to 12 months usage for Elastic Compute Service

    • Sales Support

      1 on 1 presale consultation

    • After-Sales Support

      24/7 Technical Support 6 Free Tickets per Quarter Faster Response

    • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.