There are many ways applications can be hacked, some of which could be much easier than you might expect. It is consequently important to be reasonably vigilant about securing your applications and libraries.
While software licensing is its own topic, it should always be discussed with software security in mind. It is important to know that it’s unreasonable to expect any software’s security to be impenetrable, but reasonable measures can be and should be taken to mitigate risks, as outlined in our previous article, 5 Blatant Truths About Software Licensing Systems and Piracy.
You wouldn’t give your credit card number over the telephone, if you didn’t trust the person on the other side. Similar precautions should be taken when developing applications.
“Distrust and caution are the parents of security” -Benjamin Franklin
At a high level, achieving software security is accomplished through a developer’s skepticism regarding the trustworthiness of information available to the application. For some sources of information, such as integration with a third-party service, things are often already designed to use cryptography as a means for you to establish trust that the data has actually originated from a source that you trust, and that it has not been altered. However, it is surprisingly easy as a developer to overlook your own innate trust of other sources of information.
Securing your applications and code is an exercise in verifying trust. Here are some things to be mindful of that can be particularly easy to overlook as a developer:
Of course, this list is not meant to be an exhaustive one. It is critical for developers to be mindful and proactively search for means whereby hackers can achieve what you did not intend.
.NET applications compile to “Microsoft Intermediate Language” (MSIL) code, which can be reversed engineered more easily. If you use .NET languages to write your software, read more about protecting your intellectual property with obfuscation.
“Packers” are software applications that “pack” your original binary into a new binary. The benefit of packers is that they are very quick and simple to use. However, the drawback is that they can sometimes cause compatibility issues and false positives with virus scanners.
Keep in mind that not all packers focus on security. For example, many (such as UPX) focus primarily on compression.
Within the SoftwareKey System, Instant Protection PLUS 3 and AutoCrypt SL are examples of packers that include added security features, and also add licensing to packed/wrapped applications.
Securing your software is always very important, and plays a crucial role in ensuring your software’s licensing is not compromised or bypassed entirely. There are many facets to securing your software, and many things can be easy to overlook. If you’re currently using or considering using the SoftwareKey System, and you have questions, our team is just a click or a call away. Contact us here.
Abram Pousada is one of the passionate Software Engineers with SoftwareKey.com. He started his career with SoftwareKey.com when he was in high-school and has been with the company for over a decade. After-hours, the self-proclaimed geek enjoys a variety of engaging hobbies ranging from even more programming to video games and mountain biking.
Protection PLUS 18.104.22.168 Released with New Support for Consumption-Based Licensing and More!
Protection PLUS 5 SDK 22.214.171.124 – Exciting New .NET Cross-Platform Library and Visual Studio 2019 Support
Protection PLUS 5 SDK 126.96.36.199 – Easier to Customize License Parameters
Protection PLUS 5 SDK Version 188.8.131.52 Released
Protection PLUS 5 SDK Major Updates for Android Users
Protection PLUS 5 SDK Version 184.108.40.206 Released