Protect from unpacker
I used NIS Edit to create the setup, how to protect my job?
Archive: Protect from unpacker
Protect from unpacker
I used NIS Edit to create the setup, how to protect my job?
You are using open source software, you pretty much need to change the order of the commands in the nsis source and recompile nsis.
short answer: you don't
The standard question we ask you, at this point, is this:
Are you trying to protect...
A. your installer
B. you installer code
C. the files inside your installer
D. the files being installed
For A: you can tag the installer with a customer ID.. it's easily removed, of course.. on-the-fly building of the installer would be more secure but depending on the installer size also a lot more CPU/RAM intensive.. not sure if you want to put that on a web server if that's your distribution form.
For B: although there's some old utilities that try to decompile the installer code, based on some test runs against both simple and complex installers, the result is pretty much unusable.
For C: 7zip and the like can always extract files from your installer as NSIS uses pretty standard compression routines. If you want to try to protect against that, you could try archiving them into a password-protected archive and un-archive them on installation (similarly, there are encryption/decryption plugins available which means the files are useless without decryption).
For D: even with the protection at point C, at some point the files will end up on the user's drive 'as is' in usable form. Using Process Monitor, anybody can see what registry and file i/o you perform, take the installed files + registry changes, and package that up.
So if you're trying to protect the files / application being installed.. then it's those files / that application that should have protection code added.. never the installer. Hence: you don't.
my case is C, blowfish.ddl is good? or dcryptdll?
Using a plugin to extract password protected archives can be bypassed by using a custom plugin to get the password etc
IMHO you should focus on protecting your app and not the installer and just accept the fact that unbreakable DRM is impossible
there i find the plugin?
Where, I don't think there is a public one, but it would take 5 minutes to create a fake plugin that just dumps the parameters passed to it. You could probably even hex edit the dumpstate plugin's named export.
ok but if i use blowfish.dll or dcryptdll.dll?!?!?
Does not matter which plugin you use, the key has to be in plain text at some point
Originally posted by Animaetherwhat other tools are their to extract files from installers and do they also just work when the installer is lzma compressed? 7zip does not extract when using bzip2.
For C: 7zip and the like can always extract files from your installer as NSIS uses pretty standard compression routines.
and winrar? which plugin should I use?
Originally posted by YathoshoI hear the latest beta fixed that.
7zip does not extract when using bzip2.
Originally posted by YathoshoPersonally, I'm a big fan of Total Commander...
what other tools are their to extract files from installers and do they also just work when the installer is lzma compressed?