J.C. , what if you license this software as GPL-ed software? This way you can stop this kind of stealing right away, because nobody wants a trial with the FreeSoftware Foundation . Just GPL it and add the 'OSI Certified Software' logo to your homepage and that's it.
Some days ago i download the source code, i work on it (some changes and improvements) and find a way to protect it. I mean nobody can run my version without my authorization.
How? Server side.
The software calls my own asx (not the ones it call in the first source), and then in my server i do a verification of the user and ONLY if it pass it get the .asx file otherwise it receives some generic .asx telling them they are running a stealed or pirated copy.
ricardo wrote:Some days ago i download the source code, i work on it (some changes and improvements) and find a way to protect it. I mean nobody can run my version without my authorization.
How? Server side.
The software calls my own asx (not the ones it call in the first source), and then in my server i do a verification of the user and ONLY if it pass it get the .asx file otherwise it receives some generic .asx telling them they are running a stealed or pirated copy.
If someone is talented enough, he could jack in to the EXE in a HEX editor and inject code to fool your program...
Second, Character's suggestion is best. BEFORE you do anything more get that advice otherwise you could screw up your case (and maybe even set yourself up for retaliatory proceedings).
ricardo wrote:Some days ago i download the source code, i work on it (some changes and improvements) and find a way to protect it. I mean nobody can run my version without my authorization.
How? Server side.
The software calls my own asx (not the ones it call in the first source), and then in my server i do a verification of the user and ONLY if it pass it get the .asx file otherwise it receives some generic .asx telling them they are running a stealed or pirated copy.
If someone is talented enough, he could jack in to the EXE in a HEX editor and inject code to fool your program...
I don't think so.
Let me explain how it works (im just testing, not really using it in the real world):
Legal user get some registered code (could be a user name, password, etc whatever).
I store that 'code' in server DB.
When app ask for some .asx file (needed to watch any tv channel) send the 'code'. I check it in server side and also check how many connections today usign that code with different IPs... if user dont exist or many different connections with different IPs .asx is not server.
Ok then... no need to fool the app but even how much you secure your server there are still hackers who can make DDOS attacks and even steal the passwords from the DB.
thamarok wrote:Ok then... no need to fool the app but even how much you secure your server there are still hackers who can make DDOS attacks and even steal the passwords from the DB.
Okay, i was just sharing that i find a particular possible solution for this code/problem.
Its not 100% secure but i think its not a bad one.
thamarok wrote:Ok then... no need to fool the app but even how much you secure your server there are still hackers who can make DDOS attacks and even steal the passwords from the DB.
Okay, i was just sharing that i find a particular possible solution for this code/problem.
Its not 100% secure but i think its not a bad one.
It was not a bad idea, but I just shared the ways how it still can be cracked..
Sometimes if you just don't know much then you'll drink diet cola
(This means that if someone cracks your shareware software, you won't get as much sugar [money] and you will drink diet cola [your profit is near to nothing])
Ok then... no need to fool the app but even how much you secure your server there are still hackers who can make DDOS attacks and even steal the passwords from the DB.
The security advisor for my company and i were discussing this a few days ago, and we came up with a simple solution.
2 computers;
1 containing the database and whatever else you want secured, and a program that will give out information with recognised commands from an individiual computer being;
1 the terminal, which bridges the internet and the database computer. The database computer would have a firewall that only allows information to be sent and recieved from the terminal, and ensure information only goes to the 'secretary' program that gives out the data.[/quote]
Copyright infringement is a federal crime in the US, so they got no choice than to prosecute that if they become aware of.
1. Go to http://www.ic3.gov/ and file a complaint
2. Notify his ISP that you filed a complaint and ask them to take the site down
3. Notify him about 1. & 2.
A lawyer IMO is only necessary, if you want the money he made with it from him.
With 1. - 3. you got nothing to loose, except a bit of time.
SFSxOI wrote:I have a question. Not trying to be difficult or anything ...but...How do you know it's your software for a fact?
This topic is old
I don't want to discuss this anymore but I knew he did sell my program and I have also explained why.
And btw, there is nothing I can do to stop it either, no one cares about it, I must have a registered copyright on the program if their going to care...
I like logic, hence I dislike humans but love computers.