Home > Net >  Wild code agricultural consulting a questions about the software encryption to decrypt application
Wild code agricultural consulting a questions about the software encryption to decrypt application

Time:10-30

I what also not, self-study programming to the induction phase, write a small software such as do not have what problem, can't understand a concept, now is about software registration, encryption to decrypt,

Whether the DES, AES, RSA, encryption and decryption, make the registration code, how to get to the application in software? Is to use a IF compare the decrypted plaintext? This is not only on the equivalent to 10 security doors installed a insteae? Skip the IF, in front of such a complex encryption not white blind?

Estimated to learn skills or am I not jing, which master advice me, encryption and decryption algorithm in the application of the software method, or give me advice on a few key words in this respect, I myself to learn, thank you,

CodePudding user response:

Is not complicated, just a simple encryption, just like the lock, "gentleman not lock lock". The crack metal products or be cracked, but the money can get rich.

CodePudding user response:

Can make it, the software running necessary parameters (such as: some variables), the more advanced point can be a key code, you need to run the dynamic download, without authorization, cannot download, natural processes can run (or implement some functions),

CodePudding user response:

Can compare the encrypted things, just like MD5, irreversible

CodePudding user response:

Code confusion, encryption to decrypt

CodePudding user response:

So you will crack can you jump over? System have crack, programming development tools you have crack, only valuable others membership fee so big strength to break, even if not crack, others can hold, such as a goose, you only through the law to restraint, tell him what infringement of software intellectual property rights, destroy the computer system security, the general characteristics of single machine running as long as you put the machine only code such as CPU serial number, hard disk volume label, network card MAC address out, allow the user to send you the list of values, you add a key encryption, let the user to enter in, you put the value into registries, each comparison is consistent, so it can make software use only this one

CodePudding user response:

C # to write the program can be decompiled, so any registered encryption may be bypassed,
Plus, the only way is to find a virtual machine shell, as long as not decompiled, nature also can't see If

However, there are still other ways may skip the registration test, so there is a demand on code logic, if you have registered detection and your function code coupled together, and ensure that cannot be decompiled, can resist the 99% of the cracked,

If your program is worth, want to find a safe and reliable method of registration code generation and protection, can find my personal communication

CodePudding user response:

Just use an if, of course, easy to crack, so to make the software is difficult to break, need in many places, combined with the if, second, even if only an if, after the encryption is hard to find, complex encryption system, even if the same Duan Mingwen data, at different time points encryption is different, the result of the increased difficulty of crack,

CodePudding user response:

everyone a great god be calm, I just want to know and learn about the application of encryption software method, don't want to write a bunch of bull B encryption, decryption code later, and finally to a simple IF judgment, give a person easily broken, I just want to learn more advanced software encryption application logic method or code, I don't have anything valuable to encryption software, also don't pull what Microsoft and apple can be cracked, I just want to know and learn, master sincerely want to consult everybody to give directions direction, key words, mouth cannon teacher please bypass, thank you,

CodePudding user response:

The most reliable network authentication

CodePudding user response:

Learn devexpress, each module to invoke the validation, match line to verify again,

Assembly add signature, puts the global cache, registration code by the operating system controls,

Code confusion, so that the decompiled out only the function name,

Use encryption, encryption key parameters,

Jacket, hide the encryption logic,

CodePudding user response:

references stay eighth floor oO response:
everyone a great god be calm, I just want to know and learn about the application of encryption software method, don't want to write a bunch of bull B encryption, decryption code later, and finally to a simple IF judgment, give a person easily broken, I just want to learn more advanced software encryption application logic method or code, I don't have anything valuable to encryption software, also don't pull what Microsoft and apple can be cracked, I just want to know and learn, master sincerely want to consult everybody to give directions direction, key words, mouth cannon teacher please bypass, thank you,



In fact, these are the details of the won't someone to teach you, because of the involved technology is too complicated,
If you just want a keywords to baidu virtual machine shell

CodePudding user response:

Encryption to decrypt most associated with reverse engineering, for a very simple and more classic algorithm or model, by many, others directly to figure out, for the comparison of heavy and complicated, pains that you will teach others, in addition, also considering the ocean and traces hidden data related factors, as for, encryption engineering professional, very consumption mental and word hard to into the line,

CodePudding user response:

Using the ras asymmetric encryption, a bit safer,
  •  Tags:  
  • C#
  • Related