Presentation is loading. Please wait.

Presentation is loading. Please wait.

By:Sachin f. Gondaliya(4th ce) “crackers” “A challenge for software Protection enggs.”

Similar presentations


Presentation on theme: "By:Sachin f. Gondaliya(4th ce) “crackers” “A challenge for software Protection enggs.”"— Presentation transcript:

1

2 By:Sachin f. Gondaliya(4th ce)

3 “crackers” “A challenge for software Protection enggs.”

4 Weapons of a cracker 1.Debugger : 2.Deassembler: 3. Decompilor: 1.1

5 Debugger  A powerfull tool which can trace an application instruction by instruction

6 Dissemblers  A tool that can translate the application code direct into machine language

7 Types of protection for software 1. Regkey validation 2. Trial version. 3. Hardware protection.

8 Regkey validation  a common regkey for all pcs. aa regkey according to user and organisation name. aa regkey varying according to configuration of user's pc. oonline regkey validation.

9 Trial version  according to no of times application started.  time trial version.

10 Hardware protection  application requiring hard ware dongle to be connected.

11 Cd copy protection 1.damaged table of contains. 2.original cds with higher dencity. 3.mechanically damaged cd. 4.digital signature.

12 Cd protection softwares 1. Cd cops 2. diskguard 3. laserlock.


Download ppt "By:Sachin f. Gondaliya(4th ce) “crackers” “A challenge for software Protection enggs.”"

Similar presentations


Ads by Google