Saturday, September 17, 2011

8 Ways to Make Your Software Hacker-Proof and Crack-Proof

CryptoLicensing uses the latest military force, state-of-the-art cryptographic technology to create secure and unbreakable license codes to ensure that your software and intellectual property protection. Cryptographic license bulletproof, even when using force brute force computer. Furthermore, since the license can be generated using the private key (which only you have one), this means that it is impossible for a hacker to develop a "crack" (key generator) for your software. This is an excellent first line of defense. It is upto you to give the next line obrane.Evo some useful tips and guidelines for designing an effective licensing CryptoLicensing and writing effective for license validation for validation uses CryptoLicensing API.Filozofija is simple:. To make it as difficult as possible for a hacker to 'crack' their software and result in a hacker to lose interest in your software or do not make it worthwhile for him / her


Check the license of times


instead of checking licenses for software running just check the permissions on several points during the execution of your software from multiple locations in the code. Do not use a routine license check the validity of your software. Check the licenses from different places in your software, but do not call a routine check permission. This ensures that hackers can not bypass its licensing scheme simply hacking a piece of code in their software and forces the hacker to locate each piece of license validation code in your program.


Using multiple layers of Licensing checking


In addition to the normal permissions checks for every time you run the software, add another layer, which checks for permission when a random criterion is met. For example, you can check the license on the second Monday of the month, or every 63 days, or at the 29th February in a leap year. If a hacker goes beyond the normal permission checking code, an additional 'guerilla' layer is still present, which will verify the license and cause the check to fail.


Use encrypted DLLs


to move some important part of your software in a dll and dll encryption using a key. When generating licenses using CryptoLicensing, pass the key in your license codes (use the custom user data feature CryptoLicensing for this) and decrypt dll using this key before loading. This ensures that even if a hacker goes beyond licensing verification code, the software will not work properly because it can not load the DLL file is encrypted.


Make mince your EXE / DLL detect tampering


can include hash / check your exe / dll in your license codes generated using CryptoLicensing (using a custom user data feature CryptoLicensing for this). When the exe / dll is loaded, you can recalculate the hash in the exe / dll, and compare it with those involved in the permit. If otherwise, it means that your exe has been tampered with or altered. Similarly, the license checking, perform this test on several points of time and place in your software.


Do not miss the chance to show


If a license check fails, keep in mind that, but not immediately displayed to the user check failed. Instead, wait for some other part of your program to run and inform the user there. This makes it harder for hackers to locate and bypass your license verification.


Do not use explicit error messages


When you inform the user failed to check the license, do not use explicit and obvious message, like 'licenses are not valid. "Instead, show a generic failure message and prompt the user to contact the support department. On May not know that the cause of the error failed to check the license, and when contacted, you can try to make sales and convert illegal users in the licensed user or even catch a hacker if you have contacts.


do not crash or produce incorrect results or output when the license does not make


in combination with more than two, when a license check fails or if you determine that your software is hacked or licensing scheme has been compromised, please note that when the software is performing some processing at a later time, you can knock down your software or output incorrect results. Sometimes, the hacker can lose interest in your 'crazy' program that does not display informational messages about the error!


Embed the user information generated in the license


When generating a license, pass some user information in the permit, such as user name, e-mail or company name. Display this information prominently in several places in your software. This is a very effective way to discourage users to share his / her license in another.

0 comments:

Post a Comment