peterg70
December 4th, 2001, 08:13
Guys,
Is it me or do people simply not read what people write. How about answering what someone asks. Or offer ideas to lead down the path they asked.
Answers like don't bother its too hard for a newbie and Why Bother are not constructive or useful.
Answers like find OEP and unpack are a waste of bandwith. I know i have to find the OEP Its rule one of unpacking.
I have been asking question lately on crypkey. Yes i am a newbie to the task of crypkey. It pisses me off that this has stumped me badly but i want to understand the method of operation and the way the protection is implemented. In this way when they release a new version i.e. 5.2 5.5 and now 5.7 i am able to adapt easily since the protection is never revamped significantly to hinder the bypassing of the protection.
Back in the days of fravia. I worked with the guys working on the FlexLM system. I couldn't care less about changing JNZ to JMP etc. We all started to pool our information and to decryt it. Then tools were created to generate the keys etc for the program. Well crypkey is the same sort of program but no one seem to be interested with this?? This is causing it to be used more and more which means we will have problems later on.
Anyway take the above with a grain of salt (or some jim beam)
Peterg70
Is it me or do people simply not read what people write. How about answering what someone asks. Or offer ideas to lead down the path they asked.
Answers like don't bother its too hard for a newbie and Why Bother are not constructive or useful.
Answers like find OEP and unpack are a waste of bandwith. I know i have to find the OEP Its rule one of unpacking.
I have been asking question lately on crypkey. Yes i am a newbie to the task of crypkey. It pisses me off that this has stumped me badly but i want to understand the method of operation and the way the protection is implemented. In this way when they release a new version i.e. 5.2 5.5 and now 5.7 i am able to adapt easily since the protection is never revamped significantly to hinder the bypassing of the protection.
Back in the days of fravia. I worked with the guys working on the FlexLM system. I couldn't care less about changing JNZ to JMP etc. We all started to pool our information and to decryt it. Then tools were created to generate the keys etc for the program. Well crypkey is the same sort of program but no one seem to be interested with this?? This is causing it to be used more and more which means we will have problems later on.
Anyway take the above with a grain of salt (or some jim beam)


Peterg70