
- #UPX FILE IS MODIFIEDHACKEDPROTECTED SERIAL NUMBER#
- #UPX FILE IS MODIFIEDHACKEDPROTECTED SERIAL#
- #UPX FILE IS MODIFIEDHACKEDPROTECTED SOFTWARE#
- #UPX FILE IS MODIFIEDHACKEDPROTECTED LICENSE#
To protect yourself from hex-editors and decompile-recompile hacking techniques, a developer can include an encrypted SQLite database settings file which contains a hashed checksum of the application. HackMyApp will reveal any such security issues, so that you may go back and fix them before distributing your finalized software.

#UPX FILE IS MODIFIEDHACKEDPROTECTED LICENSE#
In turn, you are stealing money from MonkeyBreadSoftware, risking your license getting terminated, and losing money yourself.
#UPX FILE IS MODIFIEDHACKEDPROTECTED SERIAL#
Without first encrypting the serial number, and using a decode method in place of the actual serial, you are freely giving away your licensed embedded serials to anyone willing to search for them.
#UPX FILE IS MODIFIEDHACKEDPROTECTED SERIAL NUMBER#
When using MBS Plugins or a number of serial-based development plugins and tools, a developer inserts a serial number directly into the Xojo code editor, and rarely thinks of the consequences.

HackMyApp was designed to help Xojo developers realize exactly what they are handing over to the public, before it is too late. Using debugging tools such as OllyDbg, a hacker can modify the raw address points and create cracks to skip over serial number verification, create key generators based on the assembly code, and steal passwords or sensitive data embedded directly in your applications. First your application will be searched for ‘plain-sight’ non-binary strings, then searched by a binary-to-hex algorithm to obtain all classes, methods, objects, properties, and controls. During this scan, your application will be torn-to-shreds using 12 common hacking methods. Using HackMyApp, you will notice that every control, class, object, string, image, and every property and method are visible using the “Advanced Scan” technique. But that doesn’t mean you can’t give a hacker quite a struggle in their progress by using very simple encryptions/decryptions in place of raw strings (EncodeBase64 will not work…).
#UPX FILE IS MODIFIEDHACKEDPROTECTED SOFTWARE#
To a seasoned hacker, anything included in your software before compile-time, is fully available using the right techniques, patience, and determination. The art of hacking can be troublesome for developers, when trying to make a living, as well as keep data safe or unseen from prying eyes. Blacked-out above, one could find serial keys, account logins, and a number of “secret” items. To think, a developer of Xojo for over 15 years, never once worried about their MBS Plugin serial or eSellerate account information being public…and a single 10 minute scan later, revealed much was being compromised. Here is a scan of a well-known developer tool (from a well known developer…whom I’ve contacted privately already) containing a number of issues… (I’ve already contacted the authors and the issues in their software have been rectified for some time now.) Using HackMyApp on over 20 publicly available well-known Xojo applications, I was abhorred to find MBS Plugin serials, eSellerate credentials and account information, Einhugur serials, as well as some other serious “should be kept secret” data. After I began porting this application (from VB6 -> LiveCode -> Xojo), I became even more troubled to see Xojo veterans of almost 20 years themselves becoming lazy in thinking about what they are actually handing out to the public. Over the past few months I’ve seen a number of forum posts regarding security, and some really troublesome posts of users thinking about embedding credit card numbers in their software (NEVER DO THAT!!!), passwords to their accounts, and a number of confidential/private information. This application was developed to make developers mindful of what they’re giving away freely.

HackMyApp will attempt its hand at decompiling your software (in memory…not to disk) to reveal potential vulnerabilities, deobfuscate data you’ve tried securing, and present you with a list of information you are freely giving away everytime you distribute your software. I’ve created your very own hacker that is willing to work for you, in your favor.

Although it is impossible to make a 100% hack-proof application, it is possible to cover many bases so that hackers/crackers have a harder time doing what they do best. I see many great pieces of software come from Xojo developer’s.
