Advice on Registration Approaches

Richard Gaskin ambassador at fourthworld.com
Sun Jan 12 22:30:00 EST 2003


Alex Rice wrote:

> A particularly easy one to implement is to use a message digest (SHA,
> or MD5) of a string that can be generated at run-time to compare with
> the the user's digest key.

I've heard of this approach to determine if a software has been cracked:
have some external component get the md5digest of your app file at boot, and
compare it to the one from when you shipped the product.  If it doesn't
match then the software can just refuse to complete the boot.

But of course this has its own vulnerabilities: if they can dsassemble the
code for the md5 comparison, they can just as easily disable the routine
that requires it.  ;)

-- 
 Richard Gaskin 
 Fourth World Media Corporation
 Developer of WebMerge 2.1: Publish any database on any site
 ___________________________________________________________
 Ambassador at FourthWorld.com       http://www.FourthWorld.com
 Tel: 323-225-3717                       AIM: FourthWorldInc




More information about the use-livecode mailing list