Creating your own executable from a PB program?

Everything else that doesn't fall into one of the other PB categories.
ricardo
Addict
Addict
Posts: 2438
Joined: Fri Apr 25, 2003 7:06 pm
Location: Argentina

Post by ricardo »

thefool wrote:Just be sure to hide the md5 checking and so on; and be sure to have some anticracking stuff at the check.! Or pm me for some tips to make it harder, wich can even be used in combination with an external thing.
Why dont you post some "anticracking for idiots" post (by that i mean for newbies in those area, just like me)!! I will be the first interested on this :D
User avatar
Fluid Byte
Addict
Addict
Posts: 2336
Joined: Fri Jul 21, 2006 4:41 am
Location: Berlin, Germany

Post by Fluid Byte »

thefool wrote:Go search?
I already did but I'm confused with the mass of information. I mean I searched Wikipedia and got the link to the AES homepage but it's completely outdated. I searched with Google but only found sourcecode and dll's wich were badly documented. Then I searched the forum but there too many posts to veryify them all and the userlibs I found are either incomplete or I just don't feel save about the fact that the lib is done by some unknown PB user.

Well, I try to examine my last findings later on.
thefool wrote:Well there are only one person that can answer on that. YOU.
But I'm just a clueless n00b that depends on your incredible awesomeness! :roll:

I maybe got a concept though...

What if I put commands in the script/project (<--- same!) that only the "compiler" would understand but not the human eye. I mean instead of putting a command into string form like:

Code: Select all

[main]
resolution=640x480
depth=32
....

[sound]
freq=44100
bits=16
stero=yes

[resources]
images/sprite1.bmp
images/sprite2.bmp
......
you could just use values of the type BYTE, WORD and LONG and write these to the file. When you just see a bunch of numbers you couldn't interpret them because you don't know what they do. So it would look something like this:

Code: Select all

34c4v§89j4fj30images/sprite1.bmp4r245t6images/sprite2.bmp
Just a load of smybols and numbers wich don't make sense. So the proccess of encrypting the script/project would be redundant.
You can use the command line to run the script, not for the end of itself but from some file (the project).

So, when then engine runs if it receives some command line (lets say "/RUN c:/path" it should run from the file... also, its suppoused that in this very case the file will not be encrypted. You can also make sure that the one that are calling engine its the IDE by checking the MD5 of the program that call your engine.
To be honest, I didn't understand a word. :oops:
ricardo wrote:Why dont you post some "anticracking for idiots" post (by that i mean for newbies in those area, just like me)!! I will be the first interested on this
I would second that.
Last edited by Fluid Byte on Sat Oct 28, 2006 5:27 pm, edited 1 time in total.
Windows 10 Pro, 64-Bit / Whose Hoff is it anyway?
thefool
Always Here
Always Here
Posts: 5875
Joined: Sat Aug 30, 2003 5:58 pm
Location: Denmark

Post by thefool »

ricardo wrote: Why dont you post some "anticracking for idiots"
I could. But im using a lot of the home brewn stuff for a commercial product; however i got a few that are just ported to pb that could be interesting. And some rules!
User avatar
Fluid Byte
Addict
Addict
Posts: 2336
Joined: Fri Jul 21, 2006 4:41 am
Location: Berlin, Germany

Post by Fluid Byte »

Uhmm.....

I think there's a flaw in the programming concept again.

When encrypt the key with XOR/AES where that key would be stored again?

I mean isn't that an endless loop? You encrypt something with a key. Then you encrypt the key with another key and this one with another....., etc. In the end you will have to store a key in raw form at a certain position if you want a dynamic key that changes with every new "compiled" game.

Or am I missing a point here?

PS: What ya' saying to my previous post ?
Windows 10 Pro, 64-Bit / Whose Hoff is it anyway?
User avatar
Fluid Byte
Addict
Addict
Posts: 2336
Joined: Fri Jul 21, 2006 4:41 am
Location: Berlin, Germany

Post by Fluid Byte »

Yo f00l! Get your a$$ in here! :evil:

You seem to be the only one with a knowledge capable of sorting these issues out so please bring me on track. I need answers to the previous questions or I will either have to use non-encrypted .exe's / scripts or drop the whole project.
Windows 10 Pro, 64-Bit / Whose Hoff is it anyway?
thefool
Always Here
Always Here
Posts: 5875
Joined: Sat Aug 30, 2003 5:58 pm
Location: Denmark

Post by thefool »

Fluid Byte wrote:Yo f00l! Get your a$$ in here! :evil:

You seem to be the only one with a knowledge capable of sorting these issues out so please bring me on track. I need answers to the previous questions or I will either have to use non-encrypted .exe's / scripts or drop the whole project.

Due to a very unlucky thing im very much out of time. If you can make the questions in a single post i will try to answer them as fast as possible; but i don't have the time to read back at the moment.
User avatar
Fluid Byte
Addict
Addict
Posts: 2336
Joined: Fri Jul 21, 2006 4:41 am
Location: Berlin, Germany

Post by Fluid Byte »

Sorry to hear that but at least there is a sign of life. :wink:

I will try to compact my questions and put them into a single post later on.
Windows 10 Pro, 64-Bit / Whose Hoff is it anyway?
Post Reply