1 Introduction
Development of software, especially when used for commercial purposes , the registration number and activation code is very important, unregistered users will add some restrictions , such as the number of days delay , not registered screen and so on. But now the software crack technology is very powerful, has a variety of domestic and foreign large-scale software registration mechanism , but also continue to be cracked , the state has repeatedly intensify efforts to combat illegal software publications , supporting legitimate software , but the actual effect is not ideal . Most software vendors chose to buy encryption products or encryption technologies to protect their software , encryption software protection is generally divided into soft and hard encryption.
研發軟件時,特別當用到經濟活動用場時,注冊碼和拿獲碼是十分關緊的,未注冊的用戶會加上某些限止,如運用上天的安排,延緩,未注冊銀幕等等。不過如今的軟件破解技術非常堅強雄厚,各種國里外大型軟件都有注冊機制,卻同時也不停地被破解,國度一次又一次加大力量,打壓不合法軟件出版物,幫扶正版軟件,但實效果并不理想。
2 , the common software crack method
First let us look at break of several important professional terminology.
(1)斷點,所說的斷點就是手續被中斷的地方,中斷就是因為有特別事情發生,計算機暫停現時的擔任的工作,轉而去執行額外的擔任的工作,而后再回返起初的擔任的工作接著執行。
( 1 ) breakpoints, the so-called breakpoint is the program where it was interrupted , the interrupt is due to exceptional events , the computer suspend the current task , turn to perform additional tasks , and then return to the original task continues execution. Decryption process is to wait until the program to get our input and the correct registration code and registration code ready when comparing it to break down, and then we analyze the program , find the correct registration code.
( 2 ) airspace , the so-called program of airspace , is the program its own territory the site , which is our own program to crack the program code location. The preparation of each program are no fixed pattern , so we need people in the program when you want to cut interrupt program , you must not rely on specific procedures set breakpoints, that is, we set a breakpoint should be used for each program will be to things.
(3) API, the Application Programming Interface shorthand , we called Application Programming Interface , is a large collection of system-defined function , which provides access to the operating system characteristics of the method . API contains hundreds of application calls functions that perform all the necessary operating system-related operations, such as memory allocation, the output to the screen and create a window , etc. , WINDOWS API-based programs to achieve and systems to deal with. No matter what the application , its underlying ultimately by calling various API functions to achieve a variety of functions .
Understand the above three jargon , we look basic software cracking method.
2.1 brute force method . This is the most common and easiest way to crack , cracker direct use editing tools such as ULTRAEDIT-32 on an executable file to be modified , ie by modifying the program source files can attribute to achieve crack purposes. Some components in the authentication user registration information and registration code , if the user enters the information and software registration code via an algorithm to generate equal , the program will successfully registered , otherwise registration failed.
2.2 using the algorithm Fillmore . Algorithm Fillmore is to analyze the software license algorithm based on making out a way to automatically generate software license program . So the software algorithm is very important, general software authors themselves write , easy to use software sales . Such software encryption feature is a registration code can only be used on one computer , and the computer as a one- binding. The first step is to run the trial use of the software, get this station machine software machine code , and then the algorithm Fillmore count number registration, then use the algorithm Fillmore directly calculate the appropriate registration code , and finally counted out registration code direct registration .
2.3 Using Memory crack . We know all the programs that are running the data loaded into memory all have to go , software registration code during the certification process when there will be a comparison , so we only need to know the registration code to crack the software memory address, achieve their goals . The advantage of this approach is to not have to spend a great effort to master the software registration code algorithms, very save time writing memory Fillmore . First step is to load the memory RI , and through it to get a true memory software registration code , or modify the memory of some software-related data , to achieve the purpose of cracking software . There are two kinds of ways, first get the registration code directly from memory , the second simulation in memory of the registration process of the operating environment .
2.4 patch crack method and file Registration Act . Patch crack method refers to the relevant patches to modify the software in order to achieve the purpose of cracking software . This method is generally cracked software validation registration code or time , basically modify the original program 's judgment statements. Such procedures probationary period is one month , you can put out this modification to achieve the purpose of infinite use . File Registration Act is to register the software contents into a document, in order to facilitate their own or someone else use it to register , there are registry registration file guide and guide people in two ways.
相關文章
UKthesis provides an online writing service for all types of academic writing. Check out some of them and don't hesitate to place your order.