![]() The second level of protection is obfuscation. ![]() ![]() Due to the open source nature of PHP there is virtually no way to prevent a person from hacking at the PHP engine code to intercept the bytecode after it has been decoded for execution. Unfortunately technologies do exist that will allow encoded files to be decoded. Only the encoded files are deployed and your original source code remains secured which prevents your application from being read by the casual observer. During encoding the PHP source code is converted to a binary format that is used at runtime by the PHP engine in conjunction with Zend Loader. The first level of protection is encoding. ![]() This has been true since the first hacker decompiled binary machine code. Given enough time and a determined hacker, any encoding technology can be broken. Zend Guard provides some of the best technology available to protect applications from reverse engineering but Zend has never claimed that Zend Guard is impervious to reverse engineering. We thought it was important to address it here. People are often concerned about various technologies that exist that claim to reverse the protection provided by Zend Guard.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |