• Open Menu Close Menu
  • Apple
  • Shopping Bag
  • Apple
  • Mac
  • iPad
  • iPhone
  • Watch
  • TV
  • Music
  • Support
  • Search apple.com
  • Shopping Bag

Lists

Open Menu Close Menu
  • Terms and Conditions
  • Lists hosted on this site
  • Email the Postmaster
  • Tips for posting to public mailing lists
Re: Protecting Software w/ Software License Keys...
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Protecting Software w/ Software License Keys...


  • Subject: Re: Protecting Software w/ Software License Keys...
  • From: Cryx <email@hidden>
  • Date: Tue, 18 Jun 2002 20:20:36 -0500

On Tuesday, June 18, 2002, at 09:24 AM, Gibbons Burke wrote:
The classic UNIX command "whoami" will do the trick, but that has been superceded by the "id" command.

These may be executed using the standard C function "system (char *s)", so:


You have no idea how easy it would be to defeat this scheme. Hint: never invoke external commands for "copy protection" purposes. It's simple to poison the path to use an alternate copy or the original binary to return bogus data.

Comparitively, you'd be a little better of using "getpwnam(getuid)->pw_name".

Daryn
_______________________________________________
cocoa-dev mailing list | email@hidden
Help/Unsubscribe/Archives: http://www.lists.apple.com/mailman/listinfo/cocoa-dev
Do not post admin requests to the list. They will be ignored.

References: 
 >Re: Protecting Software w/ Software License Keys... (From: Gibbons Burke <email@hidden>)

  • Prev by Date: Re: Protecting Software w/ Software License Keys...
  • Next by Date: Distinguishing displayable vs. functional keys in an event?
  • Previous by thread: Re: Protecting Software w/ Software License Keys...
  • Next by thread: Re: Protecting Software w/ Software License Keys...
  • Index(es):
    • Date
    • Thread