473,398 Members | 2,113 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,398 software developers and data experts.

Protecting ASP Applications: Need Opinions

Hello All,

I've finally written an asp app that is worthy of resale and would like to
hear from you who have done the same. What is the best way to protect my
application? I would like to stay away from anything that has to be
registered on the server as most of my target audience will not have
physical access to their web servers. They will just upload the code to
their server and set directory permissions for the database.

I 've purchased asp scripts myself in the past and had to provide a domain
name where it would be running. It would not run on any other domain but the
one I provided. Is this a practical approach or is there a better way? How
is it done? I've also seen posts about putting some of the vb code into an
activeX dll. Is this a solid solution? Again, How is this done?

I appreciate anyone sharing their experience...

Thanks in advance,
-Bill-
Jul 2 '06 #1
4 1411

"Bill K" <wk******@nospam.nc.rr.comwrote in message
news:md*****************@southeast.rr.com...
Hello All,

I've finally written an asp app that is worthy of resale and would like to
hear from you who have done the same. What is the best way to protect my
application? I would like to stay away from anything that has to be
registered on the server as most of my target audience will not have
physical access to their web servers. They will just upload the code to
their server and set directory permissions for the database.

I 've purchased asp scripts myself in the past and had to provide a domain
name where it would be running. It would not run on any other domain but
the
one I provided. Is this a practical approach or is there a better way? How
is it done? I've also seen posts about putting some of the vb code into an
activeX dll. Is this a solid solution? Again, How is this done?
Just putting some of your code into a DLL doesn't really give you a great
deal of protection from illicit copying. If someone has access to the ASP
they can probably copy the dll as well. Such a dll would also have to
implement some kind of licencing scheme. With that in place and having a
significant number of pages in your app depend on services supplied by the
DLL you can give your app some reasonable copy protection.

I appreciate anyone sharing their experience...

Thanks in advance,
-Bill-


Jul 3 '06 #2
CJM

"Anthony Jones" <An*@yadayadayada.comwrote in message
news:uc**************@TK2MSFTNGP04.phx.gbl...
>
>>

Just putting some of your code into a DLL doesn't really give you a great
deal of protection from illicit copying. If someone has access to the ASP
they can probably copy the dll as well. Such a dll would also have to
implement some kind of licencing scheme. With that in place and having a
significant number of pages in your app depend on services supplied by the
DLL you can give your app some reasonable copy protection.

Putting code in a DLL is a very effective if not foolproof technique for
securing the application (when utilising an in-built licencing mechanism),
but unless the customer has OS-level access to the server they won't be able
to install the DLL. Very few hosts will allow DLLs to be installed. Some
will, but even then, they want the source code so they can complile the DLL
themselves...
Jul 3 '06 #3
Thanks for your responses but I can't have folks doing server side installs
or dll reg.
Does anyone have any ideas on how to do the domain name (or ip address)
method described below?

I'm thinking maybe I keep a crucial part of the code on my own server, then
if the request comes from a licensed domain they have permission to execute
the code. What do you all think?
>
I 've purchased asp scripts myself in the past and had to provide a domain
name where it would be running. It would not run on any other domain but
the one I provided.

Jul 5 '06 #4
Hi Bill,

I think the main problem is that the source code is fully exposed. If
one knows a bit about VBS/ASP it's not difficult to see where the
check is and to simply divert it. There are some "encoders",
"encryptors" and "obfuscators" out there. I found that each & every of
these merely uses the Windows Encoder to make the ASP code illegible.
This is very easily reversed. It doesn't take the least bit of a
functioning brain. PHP has some nifty encoding/encrypting/obfuscating
options. The better ones are commercial products. It would be nifty if
such a thing was developed for ASP. I'm not sure however if this is at
all possible without registering components. Even if you register some
sort of "decrypter" on your own server, won't that server be killed by
each & every pagerequest that is made somewhere to some of your
encrypted script? Has anyone ever tried an effort to make protection
of source possible?

- Alex.

On Wed, 05 Jul 2006 03:26:44 GMT, "Bill K" <wk******@nospam.nc.rr.com>
wrote:
>Thanks for your responses but I can't have folks doing server side installs
or dll reg.
Does anyone have any ideas on how to do the domain name (or ip address)
method described below?

I'm thinking maybe I keep a crucial part of the code on my own server, then
if the request comes from a licensed domain they have permission to execute
the code. What do you all think?
>>
I 've purchased asp scripts myself in the past and had to provide a domain
name where it would be running. It would not run on any other domain but
the one I provided.
Jul 5 '06 #5

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

18
by: Alan Sheehan | last post by:
Hi pythonistas, I am looking for methods of deploying applications with end users so that the python code is tamper proof. What are my options ? I understand I can supply .pyc or .pyo files...
6
by: nell | last post by:
Hi all, I've developed a testing application in python, and should supply it in a way that no one (lets say they are regular users) will understand it and edit it. The application source is all...
3
by: AndyDunning | last post by:
Hello, I'm interested in establishing the best way to pass information between a vb script and a .net application. We have a VbScript that runs on a users pc every time a phone call is routed...
5
by: Kerem Gümrükcü | last post by:
Hi, how can i protect a assembly against disassembling with ILDASM and other products like that. i have a dll with some encryption methods implemented and i dont want them to be exposed, to...
25
by: Steve Lefevre | last post by:
Hey folks - I'm working on an access database that I'm hoping to be able to sell to small/medium sized business. I would like to do some trial and demoing, but I'm worried about client's ability...
2
by: Paul Aspinall | last post by:
Hi Has anyone got any reviews of the various products around to protect .NET code.... I know there are many obfuscators out there, but which are best. Also, I believe that Salamander...
7
by: Bobby C. | last post by:
My company is in the process of getting ready (well actually QTR 2 2004) to roll out a rewritten version of a vertical market application for the municipal market (small and medium sized cities). ...
10
by: Daniel | last post by:
Hi Guys I remember some strong naming things and keys that i read but cannot recall how to use it. However i am now using CLick Once deployment. Is my code safe when i deploy this way or do i...
2
by: Jeff Williams | last post by:
I am developing an application which will allow users (students) to run applications on PC's with elevated rights. This is necessary for some applications which require Administrator rights on the...
2
by: Jay Loden | last post by:
All, In studying Python, I have predictably run across quite a bit of talk about the GIL and threading in Python. As my day job, I work with a (mostly Java) application that is heavily threaded....
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.