The Java bytecode can be easily understood. Everyone knows. This afternoon I got a long-awaited JBuilder OpenTools (yesterday 1.0 released, freshly baked! But only 14 days, how to do this, so I didn't hesitate to put down Other work, studied the crack and anti-crack of the software encryption method, combined with some of the previous experience, a composition of the composition, is not encouraging everyone ...
Crack:
Some software that provides license.key (encrypted files with authorization information), usually this file uses DES, RAS, and CRC checks and generally binary (even if it is sometimes output to Base64 encoding), the direct modification file is a waste time. You can refer to read the source program to explore the decryption process. If the process is reversible, then you can realize a encryption process, you can easily generate the license key you want yourself; if the process is irreversible, not Unexvited, some encryption algorithms that have little intensity can be used in violent cracking, and there is a situation to encrypt digital encryption (generally referring to expiration time) If you can modify this expiration time, you can use it for a while, use mathematics Method Description:
Assuming that the collection X is the set of elements contained in the plain text, Y is the mapping after the X after the algorithm, including ciphertext elements, &