> Unless you can play a game with the hacker using a virtual stack, someone
> will determine enough to know everything.
The crunch is the cost of time hacking versus cost of program. You can
play merry games with SoftICE hackers, switching on/off very crucial bits
of code via bitsets etc. You have think what you are looking for when
debugging and let that lead them astray. Ultimately it would be broken but
you want to create as much aggravation as possible. A section of code that
reads a registry keys, make a sub with that as parameter and then branch
on R0 is so obviously a check that you want them to spend of plenty of
time trying to hack it :-) (ie its utterly bogus or unsets something important
if bypassed).
----------------------------------------------------------
Phil Scadden, Institute of Geological and Nuclear Sciences
764 Cumberland St, Private Bag 1930, Dunedin, New Zealand
Ph +64 3 4799663, fax +64 3 477 5232
---------------------------------------------------------------------------
New Zealand Delphi Users group - Delphi List - [EMAIL PROTECTED]
Website: http://www.delphi.org.nz
To UnSub, send email to: [EMAIL PROTECTED]
with body of "unsubscribe delphi"
Web Archive at: http://www.mail-archive.com/delphi%40delphi.org.nz/