473,797 Members | 3,166 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Ask for a tools to protect my .pyc file :)

I am sorry, may be I have not explain my mind clearly.
But I just want a tool like this : It can change the variable name into
meaningless ones.
I know it will not be safe enough, but I need one.
So I ask for help.
Thank you !!

Robert Kern wrote:
Lily Kakm wrote:
when I distribute my software, I will give the users .pyc file (maybe I
can use py2exe, but I think there's no essential different), because I
don't like them to know my source code.

But actually, through .pyc file is not so directly as .py file, but the
user can also easily guest the detail of the program. Because in the .pyc
file, the name of the variables are exist.

I ask you for a tool. Maybe it can hide the name of the variables.

That's not going to provide you any security. Any competent attacker
won't care what you name the variables.

If you want real security, don't distribute your code. Expose the
critical parts as a web service (or similar) instead.

If you want pretend security, .pycs or py2exe executables are enough.
For example:

good_node = 100
bad_node = 500 - good_node

Using this tool, it can be like this :

xxxxxxxxxx = 100
xxxxxxxxxy = 500 - xxxxxxxxxx

It has the same function, but it can not easily be seen by the users.
Reads just fine to me.
Do you know where to download a tool like this.


You ask an open source software community for a free tool to keep your
source proprietary? High expectations.

--
Robert Kern
rkern at ucsd.edu

"In the fields of hell where the grass grows high
Are the graves of dreams allowed to die."
-- Richard Harter

_______________ _______________ _______________ _______________ _____
Express yourself instantly with MSN Messenger! Download today it's FREE!
http://messenger.msn.click-url.com/g...ave/direct/01/

Jul 19 '05 #1
3 1756
Is it stable ? I tried it a few months ago and it crashed on my code .... I
do not code that badly ;-)

Regards,

Philippe

ut*********@gma il.com wrote:
pyobfuscate

http://www.lysator.liu.se/~astrand/p...s/pyobfuscate/


Jul 19 '05 #3
On Sat, 07 May 2005 14:27:55 +0000, "Lily Kakm" <cs*******@hotm ail.com>
declaimed the following in comp.lang.pytho n:
I am sorry, may be I have not explain my mind clearly.
But I just want a tool like this : It can change the variable name into
meaningless ones.
I know it will not be safe enough, but I need one.
So I ask for help.
Thank you !!
It's called an "editor"... use Find&Replace... <G>

Go through your code, copy each variable name to a spreadsheet,
run some random-hash type function for each name found (make a second
column), then use the column pairs for F&R operations.
-- =============== =============== =============== =============== == <
wl*****@ix.netc om.com | Wulfraed Dennis Lee Bieber KD6MOG <
wu******@dm.net | Bestiaria Support Staff <
=============== =============== =============== =============== == <
Home Page: <http://www.dm.net/~wulfraed/> <
Overflow Page: <http://wlfraed.home.ne tcom.com/> <

Jul 19 '05 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

8
2408
by: CountScubula | last post by:
Hello every one, ( I hope all of you forgive me for this shameless plug of my little site.) Some of you may know that I have a little site for php tools (I know its small, I am working on it), there has been a lot of traffic lateley, and it looks like people are using the tools. I do not know how much traffice comes from here, but I will say it does show significate increase since my slight involvement around here. Now my question...
11
3370
by: siliconmike | last post by:
Is there a way to protect data files from access by root ? I have a data-centered website and would like to protect data piracy from any foot-loose hosting company employee. Any ideas? Thanks Mike
1
5379
by: John Michael | last post by:
I have created some password routines to protect certain forms from access without a password. This allows me to create some security for apps that will be used on diff machines for users that will not have to learn the whole access security process and me as well. I would like to lockup my database by unchecking all of the options in the tools/startup from. I know i can create custom menus, toolbars and command bars and add a link to...
3
4104
by: SpIcH | last post by:
Hi All, This is all about protecting my data in Executable file. I have developed a program in Visual Basic .NET 2002. I have many questions in mind... please help me to complete my project. 1. I have very much data to be incorporated into the executable file. I have to add much data into my developed program into 2 Combo Boxes and 1 List Box control. For that i have created an xml element with all of the
12
11095
by: =?Utf-8?B?am9uaWdy?= | last post by:
I wrote a simple VB.NET application that imports and edits CSV files. Now I’d like to “lock” the raw (pre-import) CSV files so these cannot be opened separately. It is not high-sensitive data, I just don’t want folks to peek in the files. So time-consuming encryption is not necessary, just a simple password-to-open that I can program in my application so it internally opens the imported CSV file would be perfect, but I can’t...
22
5833
by: teejayem | last post by:
Hi, I am new to programming with databases and was wanting some help. Is there any way to password protect an access database and access sent sql commands to it via vb.net code? Any help would be much appreciated. Thanks in advanced.
0
2123
by: aj | last post by:
DB2 LUW 8.2 FP14 Red Hat AS 2.1 Help gurus: I'm seeing this in my db2diag.log: 2007-08-28-15.57.58.858627-240 E8785115G359 LEVEL: Warning (OS) PID : 18117 TID : 8194 PROC : db2dasstm INSTANCE: md NODE : 000 FUNCTION: DB2 UDB, oper system services, sqloqualifydir, probe:30
7
2346
by: =?Utf-8?B?TWlrZQ==?= | last post by:
Hi. I have an ASP.NET 2.0 web application which contains an Images directory with all website images. How can I prevent other websites from creating img tags with the source as my images? I want to prevent other websites from serving my image. For example - How can I prevent another website from doing this? <img src="http://mywebsitename/images/image1.jpg" Is this possible? Thanks
3
4399
by: Sin Jeong-hun | last post by:
It seems like the Protect() uses the Windows accout information to encrypt data. If I know the user name and the password, can I decrypt it on another PC? If it is not, how about the exported key? On Windows Vista, if file encryption is used, Windows suggests to back up the key. If I import the key on another PC, then can I decrypt a data protected by the Protect() method? Or it is impossible by any means?
0
9685
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, well explore What is ONU, What Is Router, ONU & Routers main usage, and What is the difference between ONU and Router. Lets take a closer look ! Part I. Meaning of...
0
9537
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
0
10469
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
10246
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
1
10209
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
10023
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
5459
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
0
5582
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
3
2934
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.