Download presentation
Presentation is loading. Please wait.
Published byChristopher Nash Modified over 8 years ago
2
By:Sachin f. Gondaliya(4th ce)
3
“crackers” “A challenge for software Protection enggs.”
4
Weapons of a cracker 1.Debugger : 2.Deassembler: 3. Decompilor: 1.1
5
Debugger A powerfull tool which can trace an application instruction by instruction
6
Dissemblers A tool that can translate the application code direct into machine language
7
Types of protection for software 1. Regkey validation 2. Trial version. 3. Hardware protection.
8
Regkey validation a common regkey for all pcs. aa regkey according to user and organisation name. aa regkey varying according to configuration of user's pc. oonline regkey validation.
9
Trial version according to no of times application started. time trial version.
10
Hardware protection application requiring hard ware dongle to be connected.
11
Cd copy protection 1.damaged table of contains. 2.original cds with higher dencity. 3.mechanically damaged cd. 4.digital signature.
12
Cd protection softwares 1. Cd cops 2. diskguard 3. laserlock.
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.