Advice on Registration Approaches
Richard Gaskin
ambassador at fourthworld.com
Sun Jan 12 22:30:00 EST 2003
Alex Rice wrote:
> A particularly easy one to implement is to use a message digest (SHA,
> or MD5) of a string that can be generated at run-time to compare with
> the the user's digest key.
I've heard of this approach to determine if a software has been cracked:
have some external component get the md5digest of your app file at boot, and
compare it to the one from when you shipped the product. If it doesn't
match then the software can just refuse to complete the boot.
But of course this has its own vulnerabilities: if they can dsassemble the
code for the md5 comparison, they can just as easily disable the routine
that requires it. ;)
--
Richard Gaskin
Fourth World Media Corporation
Developer of WebMerge 2.1: Publish any database on any site
___________________________________________________________
Ambassador at FourthWorld.com http://www.FourthWorld.com
Tel: 323-225-3717 AIM: FourthWorldInc
More information about the use-livecode
mailing list