Team OS : Your Only Destination To Custom OS !!

Welcome to TeamOS Community, Register or Login to the Community to Download Torrents, Get Access to Shoutbox, Post Replies, Use Search Engine and many more features. Register Today!

Direct Crackproof your software: The best ways to protect your software against crackers by Pavol Červeň -=TeamOS=-

Mirkec

Uploader
Power User
Windows Modifier
✅ Verified Member
Member
Downloaded
57.6 GB
Uploaded
16 TB
Ratio
285.11
Seedbonus
329,011
Upload Count
83 (96)
Member for 6 years
ljmFg.jpg


Product details
Paperback: 272 pages
Publisher: San Francisco: No Starch Press, (November 1, ©2002)
Product dimensions: 18.7 x 2.1 x 23.5 cm
Language: English
ISBN-10: 9781886411791
ISBN-13: 978-1886411791
ASIN: 1886411794


Description
Crackproof Your Software is an essential resource for all software developers. It effectively teaches how to protect software against unauthorized copying and distribution. The book highlights weak points in seemingly well-protected programs. Software developers will learn how crackers break common protection schemes and how to defend against them. The book begins by introducing the developer to the techniques and programs most frequently used by crackers and discusses the basic types of protection and common protection errors. An in-depth discussion on anti-debugging and anti-disassembling details the many ways developers can protect their software. The book also includes a chapter of useful Internet resources. The CDROM contains compression and encoding software,

This book is designed to help all programmers who have ever written their own software to better protect their software from illegal copying. It will also be useful to programmers creating freeware who wish to protect their source code.

Crackproof Your Software is an English version of "Cracking a jak se proti nemm brįnit", by Pavol Červeň, the original Czech version (80−7226−382−X), copyright © 2001 by Computer Press. English translation prepared by Skrivanek Translation Services.


  • Crackproof Your Software—The Best Ways to Protect Your Software Against Crackers
  • Introduction
    • Protection as a Deterrent
    • Working with Assembler
    • Publishing Cracker Tricks
  • Chapter 1: Basics
    • Why Crackers Medicines
    • How Crackers Medicines: Debuggers and Disassemblers
      • Debuggers
      • Disassemblers
      • Decompilers
    • The Most Frequent Protection Failures
  • Chapter 2: Cracking Tools
    • Overview
    • SoftICE Basics
      • Key Commands
      • The BPX Command
      • The BPR Switch
      • The BPM Switch
      • Display Commands
  • Chapter 3: The Basic Types of Software Protection
    • Registration−Number (Serial−Number) Protection
      • Registration Number Is Always the Same
      • Registration Number Changes in Accordance with Entered Information
      • Registration Number Changes in Accordance with the User's Computer
      • Registration−Number Protection in Visual Basic Programs
      • How VB4 Programs Are Cracked
      • Registration Number Is Checked Online
    • Time−Limited Programs
      • Time Limit Is Removed Once the Correct Registration Number Is Entered
      • Time Limit Is Removed Once a Registration Key File (.REG) Is Entered
      • Time Limit Cannot Be Removed; User Must Buy the Full Program
      • Time Limit Is Contained in a Visual Basic Program
      • Time Limit Applies to a Certain Number of Starts
    • Registration−File (KEY File) Protection
      • Some Program Functions Are Blocked Without the Correct Registration File
      • Program Is Time−Limited Without the Correct Registration File
      • Hardware−Key (Dongle) Protection
      • Program Cannot Be Started Without the Hardware Key
      • Some Functions Are Limited Without the Hardware Key
      • HASP Hardware Keys
      • Sentinel Hardware Keys
  • Chapter 4: CD Protection Tricks
    • Overview
    • How CD−Checkers Work
    • CD Protection Software
      • CD−Cops
      • DiscGuard
      • LaserLock
      • SafeCast
      • SafeDisc
      • SecuROM
      • VOB
    • Other CD Protection Tricks
      • CD Contains More Than 74 Minutes of Data
      • Damaged TOC (Table of Contents)
      • Huge Files
      • Physical Errors
      • One or More Huge Files
      • Demo with Selected Program Functions Limited
  • Chapter 5: Program Compression and Encoding—Freeware and Shareware
    • Overview
    • aPLib
    • ASPack
    • Ding Boys PE−Crypt
    • NeoLite
      • Advanced Compression Options
      • Icons
      • Preserve Data
      • Other Resources
      • Miscellaneous
    • NFO
    • PECompact
    • PELOCKnt
    • PE−Crypt
      • Manual Removal
      • Creating a Loader
      • PE−Crypt Options
      • PE−Crypt Summary
    • PE−SHiELD
    • Petite
    • Shrinker
    • UPX
    • WWPack32
  • Chapter 6: Commercial Software Protection Programs
    • Overview
    • ASProtect
    • FLEXlm
    • InstallShield
    • ShareLock
    • The Armadillo Software Protection System
    • Vbox
      • TimeLock 3.03 Through 3.10
      • TimeLock 3.13 Through 3.15
      • Vbox 4.0 Through 4.03
      • Vbox 4.10
      • Vbox 4.3
      • The Slovak Protector (SVKP)
  • Chapter 7: Anti−Debugging, Anti−Disassembling, and Other Tricks for Protecting Against
    • Softice and TRW
    • Overview
    • Detecting SoftICE by Calling INT 68h
    • Detecting SoftICE by Calling INT 3h
    • Detecting SoftICE by Searching Memory
    • Detecting SoftICE by Opening Its Drivers and Calling the API Function CreateFileA (SICE, NTICE)
    • Detecting SoftICE by Measuring the Distance Between INT 1h and INT 3h Services
    • Detecting SoftICE by Opening Its Drivers and Calling the API Function CreateFileA (SIWVID)
    • Detecting SoftICE by Calling the NmSymIsSoftICELoaded DLL Function from the nmtrans.dll Library
    • Detecting SoftICE by Identifying Its INT 68h Service
    • Detecting SoftICE by Detecting a Change in the INT 41h Service
    • Detecting SoftICE by Opening Its Driver and Calling the API Function CreateFileA (SIWDEBUG)
    • Detecting SoftICE by Calling Int 2Fh and Its Function GET DEVICE API ENTRY POINT for VxD SICE
    • Detecting SoftICE by Calling INT 2Fh and Its Function GET DEVICE API ENTRY POINT for VxD SIWVID
    • Using the CMPXCHG8B Instruction with the LOCK Prefix
    • Detecting SoftICE with the VxDCall
    • Finding an Active Debugger Through the DR7 Debug Register
    • Detecting SoftICE by Calling VxDCall Through Kernel32!ORD_0001
    • Using the Windows Registry to Find the Directory Where SoftICE Is Installed
    • TRW Detection Using the Distance Between the Int 1h and the Int 3h Services
    • Detecting TRW by Opening Its Driver Through Calling the API of the CreateFileA (TRW)
    • Launching the BCHK Command of the SoftICE Interface
    • Detecting TRW by Calling Int 3h
    • Detecting SoftICE by Opening Its Driver with an API Call to the CreateFileA (SIWVIDSTART) Function
    • Detecting SoftICE by Opening Its Driver with an API Call to the CreateFileW (NTICE, SIWVIDSTART) Function
    • Detecting SoftICE by Opening Its Driver with an API Call to Function _lcreat (SICE, NTICE, SIWVID, SIWDEBUG, SIWVIDSTART)
    • Detecting SoftICE by Opening Its Driver with an API Call to Function _lopen (SICE, NTICE, SIWVID, SIWDEBUG, SIWVIDSTART)
    • Anti−FrogsICE Trick
    • Detecting SoftICE by Searching for the Int 3h Instruction in the UnhandledExceptionFilter
    • Detecting SoftICE Through Int 1h
  • Chapter 8: Protecting Against Breakpoints, Tracers, and Debuggers
    • Detecting Tracers Using the Trap Flag
    • Detecting Breakpoints by Searching for Int 3h
    • Detecting Breakpoints by CRC
    • Detecting Debug Breakpoints
    • Detecting User Debuggers
    • Detecting User Debuggers Using the API Function IsDebuggerPresent
  • Chapter 9: Other Protection Tricks
    • API Hook Detection
    • Anti−ProcDump Trick
    • Switching a Running Program from Ring3 to Ring0
      • Switching into Ring0 Using the LDT (Locale Descriptor Table)
      • Switching into Ring0 Using the IDT (EliCZ's Method)
      • Switching into Ring0 Using the SEH (The Owl's Method)
    • Anti−Disassembling Macros
      • The Simplest Method
      • A Similar Method
      • Making It Even Better
      • Fantasy Is Unlimited
      • Jumping into the Middle of Instructions and Making the Code Harder to Understand
    • Detecting Attempts to Decompress Programs Prior to Decoding
    • Testing a File's Checksum with the API Function MapFileAndCheckSumA
    • Changes in Characteristics for the .code Section of the PE File
    • Finding Monitoring Programs
    • A Trick for Punishing a Cracker
  • Chapter 10: Important Structures in Windows
    • Context Structure
    • Windows NT Executable Files (PE Files)
    • Object Table
    • Section Types
      • Code Section
      • Data Section
      • BSS Section
      • Exported Symbols
      • Imported Symbols
      • Resources
  • Chapter 11: Suggestions for Better Software Protection
    • Overview
    • Rules for Writing Good Software Protection
    • Keep Current
    • Glossary of Terms
    • A−C
    • D−M
    • N−Z
  • List of Figures


Download links (Size: 16.20 MB):



 
Last edited:

blaster

✅ Verified Member
Member
Downloaded
122.7 GB
Uploaded
555.4 GB
Ratio
4.53
Seedbonus
86,339
Upload Count
0 (0)
Member for 10 years
Hello, good book again for understanding cracking, and penetrating user data, thank you and bye.
 
Top