I\'m looking for software protection and/or code obfuscation software like Oreans Themida, VSProtect, ASPRotect and similar. However, antivirus false positives is a deal-breaker for me. I cannot incon
I need to solve a reverse engineering problem of a native process. I am having unmanaged .exe of having some controls on it ( e.g TextBox, Buttons, TextAreas, ComboBoxes). After filling all the data o
I will start off with saying I know that it is impossible to prevent your software from reverse engineering.
I want to skip a line in C, the line x=1; in the main section using bufferoverflow; however, I don\'t know why I can not skip the address from 4002f4 to the next address 4002fb in spite of the fact th
Closed. This question needs details or clarity. It is not currently accepting answers. 开发者_如何学JAVA
I\'m building a blacklisting service for cracked iPhone apps and I am curious if I missed a method for detecting cracked apps.
I\'m making a commercial product that will have a client and server side开发者_开发百科. The client is totally dependent on the server , just to make it harder to crack/pirate . Problem is , even so t
Our MS Access 2000 developer left the company a year ago. We need to open his app in design mode in order to make modifications. Double-clicking the .mdb file while holding the shift key doesn\'t work
How can I crack two ciphertexts that have used the same key twice? For example, plaintext1 uses the key \"abcdefg\", and plaintext2 uses the key \"abcdefg\".
Closed. This question needs to be more focused. It is not currently accepting answers. Want to improve this question? Update the question so it focuses on one problem only by editing this