Hi Ilan, I think that you are asking the wrong list. The denizens of this list spend most of their time working to ensure the oposite of what you want.
- yba On Thu, 13 Nov 2003, Ilan Finci wrote: > Hi, > The company I work with is creating executable code we give to potential > clients to test. > > The code comes as either an executable or a shared library (with a given > API the client use to connect it to his application). > > Is there a way to protect such executable/library, so it will be hard to > do reverse engineering and find out what the algorithms we use? Of > course, we protect ourself with patents, but we would like something in > the level of protecting the code itself. > > Of course it is all done on linux (PPC or x86 version). > > Thanks, > Ilan > > > ================================================================= > To unsubscribe, send mail to [EMAIL PROTECTED] with > the word "unsubscribe" in the message body, e.g., run the command > echo unsubscribe | mail [EMAIL PROTECTED] > > -- EE 77 7F 30 4A 64 2E C5 83 5F E7 49 A6 82 29 BA ~. .~ Tk Open Systems =}------------------------------------------------ooO--U--Ooo------------{= - [EMAIL PROTECTED] - tel: +972.2.679.5364, http://www.tkos.co.il - ================================================================= To unsubscribe, send mail to [EMAIL PROTECTED] with the word "unsubscribe" in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]