PureBytes Links
Trading Reference Links
|
Brower states that it was in "protected" mode, which supposedly could not
be cracked for the reasons you've listed, but it was. You might verify this
by contacting Brower. I know that Russian crackers (also members on this
list) have cracked pretty much all publicly released system code in
encrypted formats (ELA, ELS, DLL, including Diamondlock).
The safest way to protect your code is to not release it. Eventually it
will get cracked.
MT
At 10:42 AM 11/27/01 -0600, Mike Eggleston wrote:
> > From: William Brower <1000mileman@xxxxxxxxxxxxxx>
> > Subject: TS2000 password protection defeated
> >
> > The code below was sent to KD in protected form.
>It looks like the code snipped posted and cracked used the password
>version and not the source protect version. I thought in the source
>protect version that there would be no source; only the byte-compiled
>code. As such, there would be no way to retrieve the comments nor the
>variable names.
|