Hello all,
I would like to discuss methods for increasing the difficulty of reverse engineering a Delphi program protected by LimeLM activation. While it is known that no programming technique can provide 100% immunity against reverse engineering, there are ways to make it more challenging. For instance, a cracker may locate and remove the line of code that terminates the application (e.g., Application.Terminate;). Alternatively, they might identify a critical boolean evaluation and modify it to bypass the checking logic. It would be helpful if you could provide an example of such a scenario.
I must commend LimeLM for its effective use of cryptographically signed activation keys. However, I'm curious about the logic employed to verify these keys.
Thank you in advance.
Sincerely,
Has Esa
Baghdad, Iraq
there are ways to make it more challenging
Not really. That’s a common misconception. And there are still companies that exist that lie and say they can make reverse engineering harder.
Don’t waste your money on scams.
We talk about this at length here: https://wyday.com/limelm/features/why/#snake-oil