

Kalau udah fix, agan transfer ke aye baru ane kirim full file encodednya minimal order 1 file. Kalau ane berhasil, ane bakal ngirim file decodednya ke agan (tapi sebagian ya) buat pratinjau. Trojan weenie wanna bees cant do shit but be pains in ones ass. If the real coder as we know takes time to code whay woulnt they make it a completed ver for use.

Now myself am the fan of F$#k those poster s that post virus on purpose.FIX THis POST pleaaseAs a rule of thumb if you need to add dll's or OC files its a trojan. Now every one and their brother loves hosting other folks downloads and spreading the viruss around the world. I posted my findings and so did others.He then posted a version here saying it was TrioXX source. Then of course Cyko posted that he did not and it wasa fake.So i took it and tested it on a p3 machine box and it loaded a trojan that hooks into the userinit on boot.

Something like that over at a nopther forum and said it was decodebyus newest version. Seems that xXfighterXx posted a version caled ID Ioncber 1.0.

The law and final word of this is: if you build it, expect it to be broken and plan for it.Well i agree. Why? Because, whilst they are not perfect, they're good enough to dissuade the large majority of people. The same thing is true of every single DRM method around. I don't know about you, but I do not know a single non-dev who casually browses source code without the purpose of understanding it, and often, breaking it. In other words, if your user is not casually browsing, this will not hold up. This means that if people obtain access to your site's code they will not be able to use that for unintended purposes. As a result it protects your code from casual browsing. This format is hard for humans to read and convert back to source code. The following is taken from the Zend Guard page:Įncoding is a process where the PHP source code is converted to an intermediate machine readable format. However, whilst they're not trivial, they're not impossible to beat, either. I am not familiar with sourceguardian, but Zend is built in the same fashion, albeit a bit more secure and harder to beat than ionCube. Why? Because it dissuades the large majority of script kiddies. It runs as a VM - and is vulnerable to all VM side-channel attacks in addition to flat-out reverse engineering (one presentation here: ). IonCube relies on a pretty simplistic implementation - XOR from start to finish, which is hardly a "security measure". The answer simply reduces to: because there are dumbasses stupid enough to believe that PHP can be "securely encoded", the same way there are people stupid enough to believe that requiring a serial code for an application automatically makes it secure.
