About Trade program protection

Source: Internet
Author: User
Any friend in the business program protection field has experience in this field. The program can be used only after authorization, and the source code is not open. Can Zend be cracked after Encryption ?, After encryption, the decryption environment is supported. installation is a problem. what if the buyer uses the rented space and the Gateway does not let you install it? I suggest you issue compact-format code with some scrambling code (the speed of all scrambling code is too low). few people are interested in commercial program protection.
Who has experience in this field,

The program can be used only after authorization, and the source code is not open.

Can Zend be cracked after Zend encryption?


------ Solution --------------------
Encryption requires support from the decryption environment. installation is a problem.
What if the buyer uses a rented space and the Gateway does not let you install it?

I suggest you issue compact code with some scrambling codes (the speed of running all the scrambling codes decreases too much)
Few people are interested in studying the code.

Authorization requires authentication. where do you plan to perform authentication?
------ Solution --------------------
You just need to open the background to sell services to people. your code will not be leaked if the host is not hacked...
------ Solution --------------------
If there are specific customer objects, hybrid programming is recommended. some key components do not use open source program code.
------ Solution --------------------
Encrypted programs can be resold.
Unless the encryption and decryption software is private to you, you can earn another one by the way.

Only servers with specified IP addresses are allowed to run.
The authentication information is directly written into the program and cannot be used without the specific environment.

------ Solution --------------------
Difficult... I have been fighting for desktop program encryption for many years (not studying encryption, but encryption programs). It is also difficult to use 32-bit encryption. However, 32-bit encryption has many international shells, but it is still very difficult, the most important thing is that it can prevent small scammers with low levels. it is really a hit in their eyes.

Then try zend, except for some encryption that seems to have loaded dll controls, which should not be so easy to solve.


------ Solution --------------------
The process is like this, so the key is the encryption you said yourself. if there is no encryption, someone else will read your writing method. as long as the algorithm can be reversed, there will be a registration machine.
Come on, haha. why don't you write a whole set of things to provide us with encryption to provide authorization and authentication.

Discussion

The authentication information is directly written into the program.
Isn't it easy to crack?

What else do I have to renew for monthly computing...

Some of my ideas are,
The user's server request specifies an authorization code of the response program of our api. this authorization code has a record of the validity period, expires, or exits directly in a program that does not allow ip requests, or unavailable.

I don't know how feasible it is,

In the end, I still feel that encryption is a part of the process. if encryption is not performed, the pure php code will still be easily cracked.


Reference the 7th floor ......

------ Solution --------------------
I used to use other people's code. Later, the new version was not released. I don't know what the situation is.
Discussion

Then there is an encryption problem. zend saw a cracked message before and I don't know what's going on now.

I also thought that php calls the c program for some part of the computation, and I don't know if it will be decompiled or something.


Reference:

Difficult... I have been fighting for desktop program encryption for many years (not studying encryption, but encryption programs). It is also difficult to use 32-bit encryption. However, 32-bit encryption has many international shells, but it is still very difficult, the most important thing is that it can prevent small scammers with low levels. it is really a hit in their eyes. ......

------ Solution --------------------
Discussion

Then there is an encryption problem. zend saw a cracked message before and I don't know what's going on now.

I also thought that php calls the c program for some part of the computation, and I don't know if it will be decompiled or something.

------ Solution --------------------
Second solution... silly...
At that time, someone wrote php as a desktop tool... if your sister needs someone to install apache + php databases on the desktop, it is not estimated that it is too painful to install mysql. sqlite is used. at that time, I tried to analyze the data transmission principle of the thing.



Discussion

I have never been involved in this aspect, but I don't know it. I don't do this in the source code...


You have also solved other people's source code ..

Is there any solution?


Reference:

I used to use other people's code. Later, the new version was not released. I don't know what the situation is.
Reference:

Then there is an encryption problem. zend saw a cracked message before and I don't know what's going on now.

I also thought that php calls the c program to do some work ......

------ Solution --------------------
There is really no good way .....
It can only defend against low-handed and no-expert defense ....

I think piracy is generally used (Keke, it is about the server side, the client side, and Keke), which is not a potential user ...... if he is protected, he will definitely want to find someone else not to pay.

I want to speed up the update myself. if someone has installed pirated files, I will call you .... we have upgraded to the YY version. you are still in the XX version... we have fixed the NNN bug and added MMM new features .... and so on.
------ Solution --------------------
Sell services. do not sell products.
------ Solution --------------------
How can I sell services without a team or a broker?

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.