Anyone with a debugger and minimal knowledge of assembly can crack and patch 
your executable in 15 minutes. I used to do it myself when I was 16. Instead of 
wasting time on this, focus on making your application better.

-- ank


On 09/10/2012, at 12:15 PM, Alexander Bokovikov <openwo...@uralweb.ru> wrote:

> 
> On Oct 9, 2012, at 1:00 AM, Simone Tellini wrote:
> 
>> 
>> this is way overkill. You can simply write a simple utility to dump the 
>> content of your resource in a C file:
>> 
>> static char foo[] = {
>>       0x01, 0x02, 0x03, 
>> ...
>> };
>> 
>> You don't need to use assembly nor to create bogus functions to get the 
>> address of foo.
> 
> Oops… You haven't caught the idea… Everybody knows how to create a _data_ but 
> I've described, how to _embed_ data into the _code_ segment. This way can be 
> used if it's necessary to hide some data against patching.
> This code sample is related to software protection area.
> 
> Best regards,
> Alexander
> _______________________________________________
> 
> Cocoa-dev mailing list (Cocoa-dev@lists.apple.com)
> 
> Please do not post admin requests or moderator comments to the list.
> Contact the moderators at cocoa-dev-admins(at)lists.apple.com
> 
> Help/Unsubscribe/Update your Subscription:
> https://lists.apple.com/mailman/options/cocoa-dev/ank%40a2apps.com.au
> 
> This email sent to a...@a2apps.com.au


_______________________________________________

Cocoa-dev mailing list (Cocoa-dev@lists.apple.com)

Please do not post admin requests or moderator comments to the list.
Contact the moderators at cocoa-dev-admins(at)lists.apple.com

Help/Unsubscribe/Update your Subscription:
https://lists.apple.com/mailman/options/cocoa-dev/archive%40mail-archive.com

This email sent to arch...@mail-archive.com

Reply via email to