It's fairly strong though. If you used a reasonably strong crypto algorithm then it'd be extremely difficult to crack without at least one sample host/key pair to find the decryption key.
No, it is not. Someone can use winice to debug to the point where you call checking logic and just simply patch the executable with a jmp assembler code to disable the logic. So strong crpyto will not work, no matter how strong it is. That is just the basic lesson for training a skilled hacker.
The idea is that the program doesn't have a copy of the decryption key. That key is constructed using the host string (hashed from the computer's signature data) and the registration key provided when the software is registered. So if you don't have a host/key pair, no amount of debugging is going to get past the encryption.
And no, you can't just patch the checks, since important pieces of code are encrypted. IE: the bits that do the stuff that is locked out of the shareware version, for example.
-- Corey Murtagh The Electric Monk "Quidquid latine dictum sit, altum viditur!"
---------------------------------------------------------------------------
New Zealand Delphi Users group - Delphi List - [EMAIL PROTECTED]
Website: http://www.delphi.org.nz
To UnSub, send email to: [EMAIL PROTECTED] with body of "unsubscribe delphi"
Web Archive at: http://www.mail-archive.com/delphi%40delphi.org.nz/
