[Solved] How can I secure my source code [closed]

As Royal Bg mentions in the comments, if they have the source code, there’s no way you can secure it against them making a separate copy. As you mention, any attempt at a licence key, or any other type of method, they’d be able to get around. solved How can I secure my source code … Read more

[Solved] Virus signature extraction form malware [closed]

Retrieving a “signature” could be as simple as generating a digital signature via hashing for the virus(es) respective binaries. MD5 or SHA. I.E. implementing the following functionality in your code that I’m sure you’ve already started…: md5sum virus -> md5hashofvirus | md5sum virus2 -> md5hashofvirus2 Complete dossier of md5sum available here. MD5 implementation in C … Read more

[Solved] How to secure javascript code from being run on other domain (stolen) ? need more ideas

No matter how complex you make your code, it can always be read, if necessary with abstract interpretation, i.e. automatically capturing the essence of your code. Code without knowledge of internals, variable names (I assume you’re already using minimization, for example with the YUI compressor), documentation, support, and generalization is worthless for anyone else. If … Read more

[Solved] What is the purpose of $connect in mysqli_real_escape_string($connect, $username)? [closed]

Per the docs: Security: the default character set The character set must be set either at the server level, or with the API function mysqli_set_charset() for it to affect mysqli_real_escape_string(). See the concepts section on character sets for more information. And therein lies the reason for having the connection: how to escape your string depends … Read more

[Solved] C++ vulnerability issue with pointers

a=b; After this assignment a points to the same location as b (“Secure Coding”). You have lost any reference to the initial location pointed by a, so essentially “Insecure Coding” is garbage that cannot be freed. Another issue is that you are freeing the same pointer twice. After the first free you no longer own … Read more