有什么好的方法保护PHP代码?
有什么好的方法保护PHP代码?
程序绑定域名 + 绑定服务器
怎么较好的实现 不被破解?
回复讨论(解决方案)
代码高级加密
保护代码的意义是?
保护代码的意义是?
防止别人倒卖
保护代码的意义是?
防止别人倒卖
你放论坛大家看看有没有价值先...
保护代码的意义是?
虽然是免费的 但是我想把大部分的都给加密
保护代码的意义是?
防止别人倒卖
你放论坛大家看看有没有价值先...
因为幸幸苦苦花时间做出来的 不想那么容易就给别人复制了 二次修改
因为幸幸苦苦花时间做出来的 不想那么容易就给别人复制了 二次修改
资源要共享的 这样才能有进步
还是搞JAVA .net 吧,php加密用处不大
保护代码的意义是?
防止别人倒卖
你放论坛大家看看有没有价值先...
因为幸幸苦苦花时间做出来的 不想那么容易就给别人复制了 二次修改
用自己的服务器,托管。
那么对我有什么好处呢?如果我能提供保护方法的话
代码加密,貌似有个zend guard 可以看看
代码加密,貌似有个zend guard 可以看看
那么对我有什么好处呢?如果我能提供保护方法的话
我也不知道有什么能孝敬版主的
我看那些ZEND 破解群 很多PHP加密都可以破解 越看越灰心 啊 太恐怖了
我看那些ZEND 破解群 很多PHP加密都可以破解 越看越灰心 啊 太恐怖了
答案就是 你想太多了,当然不是否定你的劳动...
我看那些ZEND 破解群 很多PHP加密都可以破解 越看越灰心 啊 太恐怖了
答案就是 你想太多了,当然不是否定你的劳动...
版主大哥 现在除了ZEND GUARD 6.0 比骄傲安全以外 5.5 就不安全了吗?
还有什么其他比较好的办法 ?
好奇怪的问题。。。我接触的第一个也是唯一一个PHP应用是recess框架,哈哈,似乎天生就是安全的。
大致原理是使用apache的rewrite模块,将所有请求都提交给写一个前置的脚本bootstrap.php,由它来判断是否是合法的请求,然后将请求转换成执行具体的PHP文件。
比如,我请求mydomin.com/abc/123/345.php,服务器端的处理流程是:
1、rewrite模块把请求转给了bootstrap.php;在bootstrap.php中写入限制,只响应固定格式请求。
2、按照事先配置好的路径,/abc/123/345.php对应本目录下的abc123345.php.
3、脚本1233345.php执行并返回结果。
没有绝对的,只有相对的。
你的东西,别人愿意花时间解密,那你就成功了。
我也好奇有什么方法可以加密!
说说思想也好!,!
没有绝对的,只有相对的。
你的东西,别人愿意花时间解密,那你就成功了。
我也觉得是。。。
有软件可以加密,具体在百度上找找
www.cn758.com
zend加密 效果很好 破解出来也有很多不能运行的
我也想了解下。。
在?放之前像ANDROID??那?把?名都改成什?A,B,AA,AB之?
抄了都不知用??什?就行, 用ZEND STUDIO改文件名就自?把那些相?位置都改了
如果有心,拿到你的源码,没有破不了的吧。
可以用加密狗。不过,那么多牛公司开发的系统不照样......
我看那些ZEND 破解群 很多PHP加密都可以破解 越看越灰心 啊 太恐怖了
答案就是 你想太多了,当然不是否定你的劳动...
版主大哥 现在除了ZEND GUARD 6.0 比骄傲安全以外 5.5 就不安全了吗?
还有什么其他比较好的办法 ?
我只有桌面软件的加壳经验,对于PHP 还从来没试过去加密代码(做为技术研究只分析过一点点目前流行的混淆方法)...所以爱莫能助。
就算用c写成php的扩展也只能防别人看不到代码,有心破解还是能破的
不用加密,注释删了,变量名、函数名 MD5
估计就没多少人愿意去看了。
现在连ZEND都可以解密了。完全保护不太容易
xu大的意思是既然你不愿意分享 那我也不愿意分享我的方法
如果都不开源 那世界就是另一个样子了.
当然,如果你的代码确实非常有独创性和高价值 那另当别论.
看看,听听大家评论,新手路过,顺便敲敲酱油
xu大的意思是既然你不愿意分享 那我也不愿意分享我的方法
如果都不开源 那世界就是另一个样子了.
当然,如果你的代码确实非常有独创性和高价值 那另当别论.
求教
去注释,去空格,变量名如果转成$a $b $c...
大概就没人想看了...

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics











Session hijacking can be achieved through the following steps: 1. Obtain the session ID, 2. Use the session ID, 3. Keep the session active. The methods to prevent session hijacking in PHP include: 1. Use the session_regenerate_id() function to regenerate the session ID, 2. Store session data through the database, 3. Ensure that all session data is transmitted through HTTPS.

There are four main error types in PHP: 1.Notice: the slightest, will not interrupt the program, such as accessing undefined variables; 2. Warning: serious than Notice, will not terminate the program, such as containing no files; 3. FatalError: the most serious, will terminate the program, such as calling no function; 4. ParseError: syntax error, will prevent the program from being executed, such as forgetting to add the end tag.

HTTP request methods include GET, POST, PUT and DELETE, which are used to obtain, submit, update and delete resources respectively. 1. The GET method is used to obtain resources and is suitable for read operations. 2. The POST method is used to submit data and is often used to create new resources. 3. The PUT method is used to update resources and is suitable for complete updates. 4. The DELETE method is used to delete resources and is suitable for deletion operations.

PHP and Python each have their own advantages, and choose according to project requirements. 1.PHP is suitable for web development, especially for rapid development and maintenance of websites. 2. Python is suitable for data science, machine learning and artificial intelligence, with concise syntax and suitable for beginners.

In PHP, password_hash and password_verify functions should be used to implement secure password hashing, and MD5 or SHA1 should not be used. 1) password_hash generates a hash containing salt values to enhance security. 2) Password_verify verify password and ensure security by comparing hash values. 3) MD5 and SHA1 are vulnerable and lack salt values, and are not suitable for modern password security.

PHP is a scripting language widely used on the server side, especially suitable for web development. 1.PHP can embed HTML, process HTTP requests and responses, and supports a variety of databases. 2.PHP is used to generate dynamic web content, process form data, access databases, etc., with strong community support and open source resources. 3. PHP is an interpreted language, and the execution process includes lexical analysis, grammatical analysis, compilation and execution. 4.PHP can be combined with MySQL for advanced applications such as user registration systems. 5. When debugging PHP, you can use functions such as error_reporting() and var_dump(). 6. Optimize PHP code to use caching mechanisms, optimize database queries and use built-in functions. 7

PHP is widely used in e-commerce, content management systems and API development. 1) E-commerce: used for shopping cart function and payment processing. 2) Content management system: used for dynamic content generation and user management. 3) API development: used for RESTful API development and API security. Through performance optimization and best practices, the efficiency and maintainability of PHP applications are improved.

The arrow function was introduced in PHP7.4 and is a simplified form of short closures. 1) They are defined using the => operator, omitting function and use keywords. 2) The arrow function automatically captures the current scope variable without the use keyword. 3) They are often used in callback functions and short calculations to improve code simplicity and readability.
