What reliable systems of protection against hacking protection programs exist? In particular, from reverse engineering?
I heard vaguely about protection on the basis of code execution in self-written virtual machines.
Who knows what about this?
What reliable systems of protection against hacking protection programs exist? In particular, from reverse engineering?
I heard vaguely about protection on the basis of code execution in self-written virtual machines.
Who knows what about this?
Please correct the question so that it describes the specific problem with sufficient detail to determine the appropriate answer. Do not ask a few questions at once. See “How to ask a good question?” For clarification. If the question can be reformulated according to the rules set out in the certificate , edit it .
100% reliable systems from hacking no. Another question is that maybe it makes sense to make the software system pointless to hack.
There are many tricks designed to protect the program from hacking:
You can use any bindings to the PC hardware.
Ultimately, the cost of protection should not exceed the value of the protected =)
Open source If everything is open, then who will hack? Make love not war.
This is a joke, of course. There is the same situation as with the iron door. All these encryption, obfuscators and so on. - Protection against punks. Serious experts will not stop it. Slow down, of course, their actions, but still hacked.
License agreement + lawyers.
Do not bother with any obfuscators. Who needs it - he will restore the obfuscated code. and samopisny virtualku breaks.
Write quality software, for which people will want to pay.
A good option, but requiring a connection to the Internet from the user - shifting logic to the server.
So breaking software is useless, because it is essentially a clean view (get, show, send a request). Keygens are useless - the code is checked on the server, debug, cracks - there too. For fun you can, of course, obfuscator and walk with all sorts of antidebagami, so that the blood from the eyes.
But apply the method only if the first condition is not critical.
Source: https://ru.stackoverflow.com/questions/162105/
All Articles