Is there any low level copy protection for an exe file, whether software or hardware based? [closed] - protection

Closed. This question needs to be more focused. It is not currently accepting answers.
Want to improve this question? Update the question so it focuses on one problem only by editing this post.
Closed 7 years ago.
Improve this question
I know, I know. I'm biting off more ethics than I'd like to chew with this question but there is an importance to it. I'm selling a very limited software package to an immensely small market. The thing is, most machines running this software will be in the same building and sharing a totally open exe is not something I'd like to have happen. The user base is not going to be adept with computers, let alone piracy. What low-level options exist for copy protection? I first thought to buy encrypted and locked USB thumb drives but I'm hoping to avoid that if possible, seeing as a direct download would be much more convenient for all. I'm not trying to punish customers, just trying to keep this on a small number of machines.

Related

I want to my web be able manipulate a file from my hard disk. What should I do? [closed]

Closed. This question needs to be more focused. It is not currently accepting answers.
Want to improve this question? Update the question so it focuses on one problem only by editing this post.
Closed 2 years ago.
Improve this question
I am a beginner and I create a web app with react, I want to my web app be able to read and write a json or csv from my hard disk, I've done this easy with c++ and python I should learn about node.js, django or something like that? I've search and I don't know what to do
What should I do?
Edit: In this question I mean my disk no matter what, I readed the answers and already know what this is not a good idea
Part of the beauty of the web is that web browsers generally do not have access to the computer's filesystem. This is an intentional security choice. It would be horrible if advertisers could see the contents of your hard drive.
There are technologies that let individual websites store information on your computer that act a little bit like a filesystem, ranging from old school cookies to more advanced databases like LocalStorage or IndexedDB.

As a web developer what should my 1st step for web site security? [closed]

Closed. This question needs to be more focused. It is not currently accepting answers.
Want to improve this question? Update the question so it focuses on one problem only by editing this post.
Closed 6 years ago.
Improve this question
I know how to build a site. But I don't know how to save it from a hacker.
You can spend ages on this, but assuming you're starting from scratch, I'd go with the following:
Read your framework/language security guide. For example if you're writing the web app in PHP/Symfony, read https://symfony.com/doc/current/book/security.html and https://secure.php.net/manual/en/security.php (this should be short and easy application of best practices / tweaking known settings)
Read anything relevant on OWASP. It may be hard to do all of it, but some sections to point out are: Top 10 web issues, Development guide, Cheat sheets.
Keep applying what you learned and read more :)

How does the dropbox client for Linux work? [closed]

Closed. This question needs to be more focused. It is not currently accepting answers.
Want to improve this question? Update the question so it focuses on one problem only by editing this post.
Closed 8 years ago.
Improve this question
How does the dropbox client for Linux work ?
Does it intercept read/write system calls using something like FUSE and then makes HTTP put/get calls to the dropbox server accordingly?
Linux supports file change detection through iNotify and so there is no need for any clever filing system hacks.
The really clever parts of any of the file synchronisation tools revolve around detecting which bits of a file have changed and only sending those parts (delta changes). Any file sync service that doesn't include this is pretty hopeless. Thankfully, Dropbox have this reasonably well nailed.

linux alive message [closed]

Closed. This question is off-topic. It is not currently accepting answers.
Want to improve this question? Update the question so it's on-topic for Stack Overflow.
Closed 11 years ago.
Improve this question
I'm trying to periodically check out if several linux machines are alive.
My idea is to have a main computer that receives a periodic message from every machine, so if any of them stops messaging, the main one will know something's going wrong with that particular equipment.
I want to make it as "lite" as possible, I mean, using the less data transmission possible, because some of the machines I want to look after are placed on installation with a not so good internet connection. So, if it's possible, I'll prefer not to use email or ftp.
Any idea?
Thanks in advance.
You should use a dedicated piece of software for monitoring your infrastructure. Inventing something from scratch will probably take longer and be much less powerful than such a product. nagios for example is something that is commonly used for this purpose.
Well, you could connect to the main machine on a specific port and keep sending one byte periodically. Is that "lite" enough? :)

How have you applied ITSM concepts to your development projects? [closed]

Closed. This question needs to be more focused. It is not currently accepting answers.
Want to improve this question? Update the question so it focuses on one problem only by editing this post.
Closed 9 years ago.
Improve this question
I have taken over a large project at work that requires a lot of TLC to get it into a manageable state. The whys and hows of this situation don't really matter at this point.
I was thinking I could use some of the concepts of IT Service Management to rein in this project. It has no coding standards, no change management, no issue tracking, and no build process to speak of. Everything is done by hand in Explorer with issues added to a Word document as the help desk receives them.
What kind of formal process would you use to address this situation?
Have you considered ITIL? It has a formalized structure for some of the areas that you’re dealing with, such as application management, change management, and incident management. It’s a formal process with supporting documentation and certifications.

Resources