??? 02/24/06 19:12 Modified: 02/24/06 19:56 Read: times |
#110717 - re: eric Responding to: ???'s previous message |
Erik I agree with you, your´re absolutly right!
I did´nt explained the methode I used 16 Years deeply detailed but it should be clear that a input would be translated to a output. There was no "random crypting" used .. sure it´s outdated ... about 16 Years have past by... When I´m looking back to that Days there is a big smile in my face :-) I agree with you completly ! Nothing is "unhackable" In that case of good crypting there is allways a way to emulate something. My Posting was only Posted to get Mr. Jog Milind´s Brain working and find out something else... Cheers Stefan |
Topic | Author | Date |
HOW TO PROTECT SOFTWARE? | 01/01/70 00:00 | |
When asking questions like yours ALWAYS | 01/01/70 00:00 | |
Agree with Erik | 01/01/70 00:00 | |
Agree with Erik & Jack. | 01/01/70 00:00 | |
a simple test | 01/01/70 00:00 | |
By using a programmer which supports... | 01/01/70 00:00 | |
reading correct ? | 01/01/70 00:00 | |
Maybe all he wants is ... | 01/01/70 00:00 | |
How do you propose to do this as a condi | 01/01/70 00:00 | |
Two answers ... | 01/01/70 00:00 | |
the weekness | 01/01/70 00:00 | |
HOW TO PROTECT SOFTWARE? | 01/01/70 00:00 | |
re crypting | 01/01/70 00:00 | |
re: eric | 01/01/70 00:00 | |
where ther is a will, there is a way | 01/01/70 00:00 | |
the "simple" "encryption" | 01/01/70 00:00 | |
another example : smartcards | 01/01/70 00:00 | |
Sorry, but you are O.T. | 01/01/70 00:00 | |
what ????????????????? | 01/01/70 00:00 | |
Stop misusing this forum! | 01/01/70 00:00 | |
Where are you Jog Milind?![]() | 01/01/70 00:00 |