Please do not consider this message as an ad. But if you have a real interest to subject I do advise you to have a look at HackMe Challenge available at http://klyatskin.da.ru Also I would like to point you on a security hole in PalmOS (have a look at FlashId number replacement on my page) which can easily be implemented to HotSync(TM TM TM :) ) name also. Regards, Constantine Klyatskin http://klyatskin.da.ru -------------------------------------------------------- Date: 26 Apr 1999 12:22:49 -0700 From: "Jason Freund" <[EMAIL PROTECTED]> Subject: Re: FYI On 4/26/99, Aaron Ardiri [EMAIL PROTECTED] wrote: > the question is.. what can be done about it? and how can > we find out who is making this software available? As Ben Rampling pointed out, in most cases you could shut them down by contacting the web service that hosts their site because they probably violate their hosts' policies. But judging by the hit counters on those sites, I would guess that you would only succeed in driving them underground more. The best case scenario would be to discourage the people who update those sites enough that they are forced to host the sites on their home computer and communicate through IRC and word of mouth instead of publishing a website on someone else's server. Although I doubt that it's possible to make a crack-proof app for the PalmPilot, I'm interested in discussing techniques that developers could use to make apps more difficult to crack. Our app asks for a simple 5-digit unlock key based on the user's RegCode (or Pilot User Name). What kinds of things could we do to discourage most (PalmPilot) hackers? The only thing I could think of so far is to somehow use some modulo of the prc's checksum in a jump statement in your code, but that would be hard to do and inconvenient when you release an upgrade. - -Jason ------------------------------- ______________________________________________________ Get Your Private, Free Email at http://www.hotmail.com
