Please do not consider this message as an ad. But if you have a real 
interest to subject I do advise you to have a look at HackMe Challenge 
 available at http://klyatskin.da.ru Also I would like to point you 
on a security hole in PalmOS (have a look at FlashId number 
replacement on my page) which can easily be implemented to HotSync(TM 
TM TM :) ) name also.

Regards,
Constantine Klyatskin
http://klyatskin.da.ru
--------------------------------------------------------
Date: 26 Apr 1999 12:22:49 -0700
From: "Jason Freund" <[EMAIL PROTECTED]>
Subject: Re: FYI


On 4/26/99, Aaron Ardiri [EMAIL PROTECTED] wrote:
>  the question is.. what can be done about it? and how can
>  we find out who is making this software available?

As Ben Rampling pointed out, in most cases you could shut them down by
contacting the web service that hosts their site because they probably
violate their hosts' policies.  But judging by the hit counters on 
those
sites, I would guess that you would only succeed in driving them 
underground
more.  The best case scenario would be to discourage the people who 
update
those sites enough that they are forced to host the sites on their 
home
computer and communicate through IRC and word of mouth instead of 
publishing
a website on someone else's server.

Although I doubt that it's possible to make a crack-proof app for the
PalmPilot, I'm interested in discussing techniques that developers 
could use
to make apps more difficult to crack.

Our app asks for a simple 5-digit unlock key based on the user's 
RegCode (or
Pilot User Name).  What kinds of things could we do to discourage most
(PalmPilot) hackers?  The only thing I could think of so far is to 
somehow
use some modulo of the prc's checksum in a jump statement in your 
code, but
that would be hard to do and inconvenient when you release an upgrade.

- -Jason
-------------------------------


______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com

Reply via email to