Domain name authorization and encryption-php Tutorial

Source: Internet
Author: User
Domain name authorization and encryption problems now have such a PHP system, you can install and authorize the specified domain name, unauthorized domain names cannot be installed and used. the installation authorization File (license. key) content: GcGuHiPneUPtjA $ r % nt133 + HiG1fRXujm0HN9RGUxu5sJYnDtsfCgs3 $ r % n9bad210418 $ r % nSMn4GSa0ehXv3WRR domain name authorization and encryption
Now there is such a PHP system that can install and authorize the specified domain name. unauthorized domain names cannot be installed and used.

The content of the installation authorization File (license. key) for my domain name ipinge.com is:


GcGuHiPneUPtjA $ r % nTJH + region $ r % n9bad236918 $ r % Region + 8 $ r % region $ r % nTsj/GSq1eUa632pVfoJARx/q $ r % region/r$ r % records $ r % ntzsuchofec93w1ritvig0u8 $ r % region/v $ r % region $ r % nTZarTybleUC5hmQEfocUSxO6 $ r % region $ r % Workshop $ r % workshop/t $ r % Workshop $ r % nHcP9TifjdkO + 3 GQBedxESxzo $ r % Workshop $ r % nGsmsHibieka + h2hSedxEGxnv $ r % region $ r % nHZatE3HlKRPpiWwEKIUSSB + 3 $ r % nScf2TCLifBDqh2VWLdUVGh65 $ r % region $ r % nGsj/region $ r % Region + 9 $ r % response $ r % response + $ r % nHcj/response $ r % nSpL3T3LhLhe/imUPLYJBTxm8 $ r % nS8esEifodke/3WUCeNZDSx65 $ r % response + $ r % examples/q $ r % nR8X + HyHndhDk3GtSIoJHGkvv $ r % samples/$ r % nT8D + GCOzfxO52GVVL91ASRu5 $ r % samples + 2 $ r % samples + $ r % samples $ r % nT5b8GSO0fUa63WkFeNcVHBzv $ r % Kernel $ r % nSJb + T3Dhdha + jjkBLNREHEu3 $ r % nSJH4HiPpLhHvijgEftEVTxK5 $ r % Kernel


How is this encryption implemented?
I want to implement the same function now. you can generate a license. key authorization file for the specified domain name.


------ Solution --------------------
"Generating an authorization file" is not a key point, but is "how to use an authorization file ".

In general, it should be where your "PHP system" reads the authorization file, extracts the specified domain name from it, and compares it with the host domain name during actual operation.

As for the authorization file itself, it is nothing more than performing some reversible encoding conversion on some authorization information (including the specified domain name, user information, authorization time restrictions, and so on. If your "PHP system" is not obfuscated and encrypted, read the source program, which is easy to understand.
------ Solution --------------------
On the top floor,

It is best to read the key file of the php code.

But I guess your php code will be confused.

Zend is very convenient for decryption. Baidu has a lot of decryption tools.

Ioncube encryption is troublesome. I have studied it some time ago and transferred it to other countries in China, so there is no progress

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.