Questions tagged [protection]

avoid using this vague/ambiguous tag

571 questions
1209
votes
14 answers

Secure hash and salt for PHP passwords

It is currently said that MD5 is partially unsafe. Taking this into consideration, I'd like to know which mechanism to use for password protection. This question, Is “double hashing” a password less secure than just hashing it once? suggests that…
luiscubal
  • 23,581
  • 8
  • 51
  • 82
90
votes
25 answers

How do you protect your software from illegal distribution?

I am curious about how do you protect your software against cracking, hacking etc. Do you employ some kind of serial number check? Hardware keys? Do you use any third-party solutions? How do you go about solving licensing issues? (e.g. managing…
petr k.
  • 7,830
  • 6
  • 39
  • 52
65
votes
2 answers

When and how to use GCC's stack protection feature?

I have enabled the -Wstack-protector warning when compiling the project I'm working on (a commercial multi-platform C++ game engine, compiling on Mac OS X 10.6 with GCC 4.2). This flag warns about functions that will not be protected against stack…
Guillaume
  • 3,861
  • 4
  • 21
  • 18
57
votes
4 answers

How to protect "master" in github?

I have a few contributors in my github project. I want to allow only one of them to "push" to master. And this guy is not me (the owner of the repository). Is it possible to do?
yegor256
  • 93,933
  • 106
  • 409
  • 558
40
votes
4 answers

How can I obfuscate my c# code, so it can't be deobfuscated so easily?

I release a bunch of tools for free, but recently I have began to sell an application, that has private research, and people have been able to get my source code, and one person publically released my entire source. I spent a lot of time on this…
Ben
  • 705
  • 1
  • 6
  • 17
36
votes
2 answers

Why can I access my private variables of the "other" object directly, in my equals(Object o) method

In Java in the equals(Object o) method I can access the private variables of the passed in object without going through its public getters. public boolean equals(Object o){ ... MyObject other = (MyObject)o; return getProp() ==…
non sequitor
  • 16,626
  • 9
  • 42
  • 59
33
votes
5 answers

What is the use of -fno-stack-protector?

I have written an application in C, and I'm trying to understand what is the purpose of the -fno-stack-protector command when compiling. For my specific application, it makes no difference if I use this command or not in terms of protecting against…
touvlo2000
  • 415
  • 1
  • 5
  • 9
30
votes
1 answer

Constructor accessibility C# compiler error CS0122 vs CS1729

① In following C# code, CS1729 occurs but I understand that CS0122 would be more appropriate. namespace A { class Program { static void Main() { Test test = new Test(1); } } class Test { Test(int i) { } } } CS1729:…
Fabien Launay
  • 617
  • 6
  • 16
29
votes
9 answers

How effective is obfuscation?

A different question, i.e. Best .NET obfuscation tools/strategy, asks whether obfuscation is easy to implement using tools. My question though is, is obfuscation effective? In a comment replying to this answer, someone said that "if you're worried…
ChrisW
  • 51,820
  • 11
  • 101
  • 201
28
votes
5 answers

Error: Function is inaccessible

I'm getting this error, but I thought I would only get it if the member's protection level was too high and made it inaccessible, but I'm getting it anyway. Shopable.h: #ifndef _SHOPABLE_H_ #define _SHOPABLE_H_ #include "Library.h" class…
pighead10
  • 3,899
  • 10
  • 31
  • 51
23
votes
7 answers

What is the best way to protect sensitive data in the code?

I was examining the ways of protecting my code from decompiling. There are several good threads here describing obfuscation and code packing as the possible ways of protecting the code. However none of them is ideal, obfuscation doesn't work with…
net_prog
  • 8,810
  • 14
  • 52
  • 68
20
votes
13 answers

How to protect your software code?

Possible Duplicates: How do you protect your software from illegal distribution? Best practice to prevent software copy Hypothetical situation: Lets say I have built a software product from the scratch and it does wonderful things. The only…
user244333
20
votes
4 answers

Protect yourself against Dos attacks

This might be something more suited for Serverfault, but many webdevelopers who come only here will probably benefit from possible answers to this question. The question is: How do you effectively protect yourself against Denial Of Service attacks…
KdgDev
  • 13,321
  • 45
  • 113
  • 147
18
votes
4 answers

Android: how to protect data in a SQLite database?

I'm currently developing an Android game which saves data into a SQLite database. This is not really "sensitive" data, but I don't want users to be able to modify it (for obvious reasons of game balance, as it would be cheating). And it's quite easy…
Guillaume
  • 21,938
  • 14
  • 54
  • 69
18
votes
7 answers

Software protection for small vendors

This is a problem we all have to consider at some point. After many years and many approaches I tend to agree in general with the staterment: "For any protected software used by more than a few hundred people, you can find a cracked version. So…
Mike Trader
  • 7,978
  • 13
  • 52
  • 65
1
2 3
38 39