Anyone with a debugger and minimal knowledge of assembly can crack and patch your executable in 15 minutes. I used to do it myself when I was 16. Instead of wasting time on this, focus on making your application better.
-- ank On 09/10/2012, at 12:15 PM, Alexander Bokovikov <openwo...@uralweb.ru> wrote: > > On Oct 9, 2012, at 1:00 AM, Simone Tellini wrote: > >> >> this is way overkill. You can simply write a simple utility to dump the >> content of your resource in a C file: >> >> static char foo[] = { >> 0x01, 0x02, 0x03, >> ... >> }; >> >> You don't need to use assembly nor to create bogus functions to get the >> address of foo. > > Oops… You haven't caught the idea… Everybody knows how to create a _data_ but > I've described, how to _embed_ data into the _code_ segment. This way can be > used if it's necessary to hide some data against patching. > This code sample is related to software protection area. > > Best regards, > Alexander > _______________________________________________ > > Cocoa-dev mailing list (Cocoa-dev@lists.apple.com) > > Please do not post admin requests or moderator comments to the list. > Contact the moderators at cocoa-dev-admins(at)lists.apple.com > > Help/Unsubscribe/Update your Subscription: > https://lists.apple.com/mailman/options/cocoa-dev/ank%40a2apps.com.au > > This email sent to a...@a2apps.com.au _______________________________________________ Cocoa-dev mailing list (Cocoa-dev@lists.apple.com) Please do not post admin requests or moderator comments to the list. Contact the moderators at cocoa-dev-admins(at)lists.apple.com Help/Unsubscribe/Update your Subscription: https://lists.apple.com/mailman/options/cocoa-dev/archive%40mail-archive.com This email sent to arch...@mail-archive.com