473,406 Members | 2,336 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,406 software developers and data experts.

Lock code to one domain

59
Hi
I am trying to protect my php script from piracy. I do not want to use a commercial protection script, instead i was wondering if there was a bit of php code i could use to make my code only run on a certain domain specified? I could then encode this script so that they can't change this. Any ideas?

thanks
Dec 4 '08 #1
5 3490
Dormilich
8,658 Expert Mod 8TB
er, is your php code publicly available? usually php code doesn't leave the server (i.e. you need server access to actually get the code).

regards
Dec 4 '08 #2
ojsimon
59
I'm planning on distributing it.
Dec 4 '08 #3
Dormilich
8,658 Expert Mod 8TB
I guess there will always be a clever cracker, who can strip off your code from the (lets say) validation functions if you actually give away all your code. maybe there's a chance, if some essential part is not given away, so they have to connect to your server to get the missing information/includes. but I'm not an expert in rights management and code protection.
Dec 4 '08 #4
Markus
6,050 Expert 4TB
Why are you going to distribute it, if you don't wan't it 'pirating'?

That seems like a no-brainer, to me.
Dec 4 '08 #5
dlite922
1,584 Expert 1GB
@ojsimon
Like the guys have already said, No matter what part of your code you can hide, it always has an input output like a function. Someone could easily figure out what those are and ignore it.

To make it hard, not impossible, is to encode and obfuscate your PHP code to make it very difficult to take the time and see your source code.

PHP is based on the spirit of open source and community. Unless your charging, just put your credit line as the author and most people will respect it. Once you have distributed something, it gets its own timestamps on the Internet. Six months later someone just can't come out and say I developed this, there will be people out there that will say no, this guy did six month ago.

Don't be afraid to have your code change to a better one either.

If you're looking to make money by selling PHP code, I suggest you code using a compiled language. (Even those aren't 100% safe).

Sorry for the prolix reply,

Good luck,



Dan
Dec 5 '08 #6

Sign in to post your reply or Sign up for a free account.

Similar topics

3
by: shyju_kambi | last post by:
hi all, please give me the logic to creat a folder lock in windows2000/Xp using c program. what i mean by folder lock is, if any one is trying to open that folder, it should ask for the password...
7
by: Sunny | last post by:
Hi, I can not understend completely the lock statement. Actally what is locked: 1. the part of the code between {...} or 2. the object in lock() In the docs is written: for 1: The lock...
0
by: Nashat Wanly | last post by:
http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnaskdr/html/askgui06032003.asp Don't Lock Type Objects! Why Lock(typeof(ClassName)) or SyncLock GetType(ClassName) Is Bad Rico...
3
by: Roy Chastain | last post by:
The doc says that the same thread can acquire a lock more than once. My testing STRONGLY suggests that the doc is incorrect. It appears that my thread is blocking on itself. Can anyone confirm...
4
by: UJ | last post by:
What's the easiest/best way to open a single file from multiple applications but so only one can read it at a time? I tried a mutex but had problems. I noticed there is something called a...
0
by: cwho.work | last post by:
Hi! We are using apache ibatis with our MySQL 5.0 database (using innodb tables), in our web application running on Tomcat 5. Recently we started getting a number of errors relating to...
8
by: Ritesh Raj Sarraf | last post by:
Hi, I think there is some lock problem. Let me show the code first import os import sys import string import tempfile
11
by: BLUE | last post by:
I've a class A that implements IDisposable interface and has a method that start a thread. In Dispose(bool) can I use the lock keyword to wait for thread exit before disposing resources it use or...
94
by: Samuel R. Neff | last post by:
When is it appropriate to use "volatile" keyword? The docs simply state: " The volatile modifier is usually used for a field that is accessed by multiple threads without using the lock...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.