Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:Hardware Locking (Score 1) 111

That's generally the idea to bypass most types of DRM. External/Internal patching is not a new thing. However, even disassemblers still have problems with truly decompiling P-Code, since most of the internal routines are technically "undocumented" and have been for quite some time. More than that, code obfuscation techniques aren't new either, and by definition, anything can be cracked. It just depends on how much work you want to put into it.

As for an API wrapper, considering that most of the code is a direct result of CLI scripting, the actual workaround would be to modify/fake batch scripts on the fly. The only way to do that is to either rewrite portions from the source code itself, or do an internal jump/patch (internal or external, doesn't really matter), which defeats the purpose anyway.

Comment Re:Hardware Locking (Score 1) 111

Look, if you're upset that it's written in VB6, fine, whatever. Unless you've actually got something like a direct proof of concept exploit, you have nothing to bring to the table. As for other things, I'm well aware of my own skillsets and limitations. That's why I don't just limit myself to programming. Unfortunately, I would have to make a moderately (un)educated guess that the extent of your interest in this discussion is simply to bitch because you can.

Comment Re:Hardware Locking (Score -1, Troll) 111

Again, MAC spoofing has been around for a while. That's why there is static information brought up beyond just a MAC address, which if you have a motherboard that has the capability to change the MAC address, good for you. Now, if you'll go back and read a little, you'll notice that there is a function for server-side verification. If the idea is that you're going to fake information for an entire system through windows CLI, good luck with that, bruh.

Comment Re:Hardware Locking (Score -1, Troll) 111

Yeah, nearly. I didn't say it was FULLY crackproof, but you have to know what you're doing in order to bypass it. Which is why server authentication is BUILT IN. So, unless you've got a direct proof-of-concept exploit, such as faking burned in MAC address codes, along with simple bios info (which amazingly, can be brought up via windows commandline), I would make the educated guess that you're upset in regards to me further maintaining already solid code which someone else can build on.

That's why it's free. If someone doesn't want to use it, I don't lose any sleep over it anyways.

Slashdot Top Deals

"Why can't we ever attempt to solve a problem in this country without having a 'War' on it?" -- Rich Thomson, talk.politics.misc

Working...