How major software is protected?


 
Thread Tools Search this Thread
Top Forums UNIX for Dummies Questions & Answers How major software is protected?
# 1  
Old 12-11-2013
How major software is protected?

I am a new software developer and I wish to sell my software. I recently realized that from C++ code we can not stop the user seeing parts of the code that are related to scripts or system commands.

Would you make some comments on how software written in C++/JAVA (distributed via CD-ROMs or available via download) is protected from reverse engineering, scanners for when the code is in memory and direct copy of parts (as system commands).

What a small software company which just starts producing software should do to protect its product from the technological point of view (it should not be able to pay legal fees ...)?
# 2  
Old 12-11-2013
Actually writing your application in C or Java, as opposed to using C or Java to obscure a program written in shell, would protect you a lot better.

For one thing, it'd mean they couldn't just trace the shell to get the raw code.

Second, it's very difficult to reverse-engineer C or Java application code. The program text does not exist inside the application you give to your customers(unless you accidentally include debugging information!) so they cannot extract it. All they get are raw CPU instructions or java bytecodes. They don't even get your variable names.

That said, if you're not willing to legally protect your code, you have no weapon against the truly determined. Difficult does not mean impossible.
# 3  
Old 12-11-2013
Quote:
Originally Posted by Corona688
Second, it's very difficult to reverse-engineer C or Java application code. The program text does not exist inside the application you give to your customers(unless you accidentally include debugging information!) so they cannot extract it. All they get are raw CPU instructions or java bytecodes. They don't even get your variable names.
Actually, nowadays, it is quite easy to reverse engineer most binary code using tools like HexRays IDA or the HexRays disassember. These tools are not cheap but they are what the professionals use to reverse engineer malware, spyware and the like. There are also other proprietary extensions to IDA which are domain specific and do an even better job than the HexRays disassembler.
 
Login or Register to Ask a Question

Previous Thread | Next Thread

8 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Automated passwd protected sftp

I am trying to automate the process using password protected sftp upload the file in daily basis from our server to client server and exit successfully from remote server Getting issue while running the script. sftp test@12.342.564.205/passwd--password for sftp cd /home/group/jagu/txt put... (3 Replies)
Discussion started by: jagu
3 Replies

2. UNIX for Advanced & Expert Users

Protected RPM package

Is there a way to create a protected RPM package without giving up your source code? (2 Replies)
Discussion started by: cokedude
2 Replies

3. Programming

Regarding the protected variables access

Hello forum, I am siva working as programmer .I was blocked with the below issue so please help any of the forum memebers. testve.h class cv { protected : struct state; state& m_state; }; testVe.cpp struct state { m_size; } the above are 2 files which have the... (3 Replies)
Discussion started by: workforsiva
3 Replies

4. Shell Programming and Scripting

Unzipping files <password protected>

Hie Friends, I need your help once again. I have 77 “password protected” winzip files in linux/unix server. I want to decrypt it through an automated script. Password of every file is same and it is mhd*tt. Please help me. Usually I unzip it as follows, manually one by one. unzip <file name> ... (6 Replies)
Discussion started by: anushree.a
6 Replies

5. UNIX for Advanced & Expert Users

writable protected file

Greetings I am trying to create a solution that will log information into a file. That is the easy part. What I am trying to do is have a front end script that ill ask a user what their reasoning is for logging in and log that reason into a file. The hard part I am finding is that I need that... (10 Replies)
Discussion started by: Smoker
10 Replies

6. Shell Programming and Scripting

How to make script password protected

Hi All, I want to make my script password protected. i e: if somebody runs my script it should prompt for password. Can somebody help me in to execute the same?? Thanks in Advance :b: (11 Replies)
Discussion started by: achararun
11 Replies

7. UNIX for Dummies Questions & Answers

Print on a printer which is password protected

Hi, I am trying to print from HP unix machine to a Toshiba printer which is password protected. How can I print? Thanks. Anuj (1 Reply)
Discussion started by: Anuj
1 Replies

8. UNIX for Dummies Questions & Answers

Multiple protected directories

This may have a simple answer, but I have not been able to find it! I need to have 20 protected directories. Each directory having a unique user with access. I need to have a main link on the web page that requests the username and password. Once entered it eill send the user to their... (2 Replies)
Discussion started by: ericg
2 Replies
Login or Register to Ask a Question