Hi Ilan,
I think that you are asking the wrong list. The denizens of this list 
spend most of their time working to ensure the oposite of what you want.

 - yba


On Thu, 13 Nov 2003, Ilan Finci wrote:

> Hi,
> The company I work with is creating executable code we give to potential 
> clients to test.
> 
> The code comes as either an executable or a shared library (with a given 
> API the client use to connect it to his application).
> 
> Is there a way to protect such executable/library, so it will be hard to 
> do reverse engineering and find out what the algorithms we use? Of 
> course, we protect ourself with patents, but we would like something in 
> the level of protecting the code itself.
> 
> Of course it is all done on linux (PPC or x86 version).
> 
> Thanks,
> Ilan
> 
> 
> =================================================================
> To unsubscribe, send mail to [EMAIL PROTECTED] with
> the word "unsubscribe" in the message body, e.g., run the command
> echo unsubscribe | mail [EMAIL PROTECTED]
> 
> 

-- 
 EE 77 7F 30 4A 64 2E C5  83 5F E7 49 A6 82 29 BA    ~. .~   Tk Open Systems
=}------------------------------------------------ooO--U--Ooo------------{=
     - [EMAIL PROTECTED] - tel: +972.2.679.5364, http://www.tkos.co.il -


=================================================================
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word "unsubscribe" in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]

Reply via email to