home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
DP Tool Club 15
/
CD_ASCQ_15_070894.iso
/
vrac
/
shrdit.zip
/
VENDINFO.DIZ
< prev
Wrap
VENDINFO
|
1994-04-27
|
22KB
|
445 lines
┌────────────────────────────────────────────────────────────────────┐
│ ShroudIt! source code shrouder v1.0 │
│ SEE BELOW FOR PRODUCT INFORMATION │
└────────────────────────────────────────────────────────────────────┘
┌────────────────────────────────────────────────────────────────────┐
│ This is a VENDINFO Product Information Record │
│ │
│ This record is a means of conveying information about a software │
│ product from the author to distributors and users. It contains a │
│ normal, "human-readable" section (you're reading it now), followed │
│ by a compressed data record. The data record contains a great │
│ deal of information in a form useable by automated tools. This │
│ allows BBSes, disk vendors, etc. to test automatically for │
│ permission to distribute, and to automatically extract product │
│ information for use in BBS files databases, vendor catalogs, etc. │
│ │
│ The VENDINFO file standard is published and is freely useable. │
│ │
│ The VENDINFO toolset includes a free end-user viewer, processing │
│ tools for use by distributors (BBSes, shareware disk vendors, │
│ etc.), and the editor used by author/publishers to produce these │
│ records. These tools are either free or very-low cost shareware. │
│ The toolset can be obtained from many sources, including the │
│ originators of VENDINFO: │
│ │
│ Rams' Island Software Voice: 303-841-2848 CompuServe: 76244,324 │
│ 7644 E. Lakecliff Way BBS: 303-841-6269 FidoNet: 1:104/333 │
│ Parker, CO 80134-5904 USA RIME: RAMSISLE │
└────────────────────────────────────────────────────────────────────┘
VENDINFO standard v1.00, produced by VendEdit v1.00, 27-Apr-1994
===== Product Information ==============================
Product: ShroudIt! source code shrouder
Version: 1.0
Version Date: 29-Apr-1994
Product Type: Software
Basic Distribution Policy (see License, below, for details):
"Commercial" product, intended for distribution with other s/w
Product Description: ShroudIt! source code shrouder v1.0, works
for any programming language. MUST HAVE tool
for any serious professional programmer.
Allows you to protect your source code,
provide protected toolkits and libraries,
port source across platform on customers
site, and so on. Patent pending templating
works for 'C', Pascal, dBase, BASIC, COBOL,
SQL, Prolog, PERL and more. Tutorial and
manual provided on disk.
Category: Programming utilities
Keywords: ShroudIt Shroud Obfuscate C DBASE BASIC COBOL
PASCAL PROLOG PERL SQL
Required Packages: SHRDIT01
This Package: SHRDIT01
Required Configuration
Processor Family: Intel 80x86 (minimum 8086/8088)
Minimum OS: MS-DOS 3.1
Standard RAM: 640K
Orders:
Address: LNK Corporation, Inc.
6811 Kenilworth Ave,
Suite #306,
Riverdale,
Maryland, 20737,
USA
Phone: (301)-927-3223
FAX: (301)-927-7193
CompuServe: 72030,1547
Internet: drrwebber@acm.org
Other E-mail: drrwebber@acm.org
Support:
Address: LNK Corporation, Inc.
6811 Kenilworth Ave,
Suite #306,
Riverdale,
Maryland, 20737,
USA
Phone: (301)-927-3223
FAX: (301)-927-7193
CompuServe: 72030,1547
Internet: drrwebber@acm.org
Other E-mail: drrwebber@acm.org
===== Information for Users ("READ-ME") ================
ShroudIt! source code obfuscation: **NEW** Version 1.0
from LNK Corporation, Inc, Riverdale, Maryland, a high technology company
providing innovative information technology solutions for over 25 years.
This is a comprehensive source code shrouder, using a patent pending
system that allows obfuscation of practically any computer language
system.
ShroudIt! is designed to handle modern computer languages with support
for such things as compiler directives, global includes, macros,
embedded pre-processor statements, and symbol defines.
Source code processed by ShroudIt! is fully equivalent to the original
code, except that it is now only machine readable. All comments and
meaningful variable names are removed or replaced.
This means you can distribute your source code for others to use and
compile, but your intellectual property is secured and protected.
There are over 30 available features and optional techniques, such as
replacing string constants with their ASCII hex code equivalence to
further obscure the meaning and sense of the original source program.
ShroudIt! is an essential tool whenever the security of your original
source code may be compromised. This makes it a MUST HAVE tool for
any serious professional programmer.
ShroudIt! means you no longer have to give away your best ideas free,
especially in fully interpeted environments like the PERL language,
Comes with a fully featured INTRO tutorial program, an on disk manual,
and sample templates for 'C', Pascal, dBase, BASIC, COBOL, SQL, Prolog
and PERL source code..
Requires: MS/DOS 3+, 640k RAM and 8086/8088 system or better.
========================================================================
===== Packing List =====================================
As released by the author or publisher, this package contained the
following files in addition to this VENDINFO.DIZ:
Filename Size Date Time CRC32
!README. 65 5-Apr-1994 06:31p 214C3F05
HINTS. 2049 8-Apr-1994 11:52a 6618CB17
INTRO. 1029 5-Apr-1994 03:29p 580DB8F2
LICENSE. 2521 23-Apr-1994 05:58p 8A71FC30
LOGO. 497 5-Apr-1994 03:25p 51DF3646
ORDER. 2086 5-Apr-1994 06:21p 6C459820
OVERVIEW. 1342 5-Apr-1994 03:34p B763CBA9
LOAD.C 1160 10-Mar-1994 01:30p C7556EED
SH-C.CPY 487 5-Apr-1994 06:08p 7F824BB2
SH-C.CTL 1020 30-Mar-1994 06:01p A005DDE1
SH-LOW.CTL 709 5-Apr-1994 03:50p 6C3B85F9
FILE_ID.DIZ 424 27-Apr-1994 11:38a FAF4E1C4
SHROUDIT.DOC 37817 23-Apr-1994 05:55p 1C496FC5
INTRO.EXE 145984 7-Apr-1994 06:55p 7ED97041
SHROUDIT.EXE 180368 22-Apr-1994 09:37p 8076BE45
SH-C.GLB 34 5-Apr-1994 06:30p 895E0338
SH-C.INC 20 28-Feb-1994 06:30p 0877BDDB
SH-C.KEY 907 28-Mar-1994 03:16p A97877EF
SH-LOW.KEY 907 28-Mar-1994 03:16p A97877EF
SH-SQL.KEY 386 6-Apr-1994 05:51p 195339C0
PACKING.LST 1843 8-Apr-1994 12:01p C7A4103C
SH-C.OBS 117 3-Mar-1994 06:26p 129C1D5A
INTRO.POP 1530 5-Apr-1994 06:25p 21FC850C
SHROUDIT.PRO 55835 22-Apr-1994 09:28p 6BFC0799
DESC.SDI 37 27-Apr-1994 11:38a C3DFDB6A
SHROUDIT.SHR 17513 22-Apr-1994 09:28p C1474A6A
BASIC.ZIP 766 7-Apr-1994 04:03p 9F37692D
COBOL.ZIP 1443 5-Apr-1994 03:38p 3B527B90
DBASE.ZIP 871 12-Apr-1994 01:26p C1F7CC53
EXAMPLES.ZIP 1797 5-Apr-1994 03:39p F649DCAD
PASCAL.ZIP 1368 5-Apr-1994 11:30p A4EB3D1E
PERL.ZIP 1088 18-Apr-1994 06:16p 548E4839
PROLOG.ZIP 2749 5-Apr-1994 03:38p 69B41574
===== Installation =====================================
ShroudIt! is provided as a single PKZIP file. Unpack this into
a single directory, run the INTRO tutorial, and then read the
manual (SHROUDIT.DOC). You should then be ready to try some of your
own source code using the example template control files provided.
The whole process will vary in complexity from as simple as re-compiling
say Borland C under Microsoft C, or at the high end, like using AWK
scripts to tailor the final result required.
Remember ShroudIt! only works on clean compiled and debugged code.
ShroudIt! can be placed on the system path for execution, and you can
optionally co-locate control files with source, or centrally with
the ShroudIt! program. There are also environment variables you can
set. This gives you all the flexiblity you need when working with
a massive system of hundreds of source code modules split over
a directory tree.
----- History ------------------------------------------------------
As a company we develop custom AI and Image Processing solutions and
integrate them into traditional application systems.
ShroudIt! was developed to protect our own source code library on a Sun
UNIX system for a CNAPS massively parallel processor. The CNAPS has its
own unique dialect of C and as yet no object linking capability. Our
patent pending LNK_ImageLib graphical image processing product used in
combination with the CNAPS processor gives a stunning improvement to
automated satellite imagery processing. What used to take 8 hours to do
on a high end RISC workstation, can now be done in real time in under 3
minutes. We would be happy to discuss any image processing needs you
have too.
Just a reminder that our licensing terms allow you to work with
ShroudIt! free of charge for up to 60 days. However, at the moment that
you distribute product created using ShroudIt! you must have purchased
an applicable license from LNK Corporation, Inc. See ordering details
in the accompanying ORDER file on disk.
----- Obfuscating ---------------------------------------------------
ShroudIt! is designed to be used whenever you are concerned that the
security of your original work could be compromised or you want to
protect your intellectual property. ShroudIt! uses a patent pending
rule based system implemented in Prolog that allows you to obfuscate
practically any part of your original work. The obfuscation changes
your original so that a human reader is unable to discern the sense or
meaning, but the computer interprets it EXACTLY equivalent to the
original.
All the features and techniques are controlled by externally definable
rules, so the entire process can be tailored to a specific target
source language of your choice. Of course we cannot guarantee that
ShroudIt! will work with absolutely any source, but with careful tuning
it should cover most of the major language systems in use today.
The degree of obfuscation consists of three distinct levels. At the
base level the core scrambling is achieved by replacing all variables by
meaningless random strings instead. Additionally any text inside
comments is discarded. This level of obfuscation will work with almost
any language.
The next level allows you to expand any copy book or included source code
in-line into the main source body. In addition you can replace any
numeric or string constants with tokens instead. This is done by
declaring the tokens to be equivalent to the number or text, and the
text can be optionally written as raw ASCII codes if the target language
supports this.
The final level both compresses the source and replaces keywords with
random tokens. Again this is only possible where the target language
syntax is not dependent on line numbers and white space (or end of line)
significance, and has some kind of macro or pre-processor facility.
You can use the INTRO program provided to review an example of each
level when used against a small sample 'C' language source program.
The key to successfully using ShroudIt! is to customize the rule set
to match your requirements. Several examples are provided for you to
work from. The strength in this method is that you can set ShroudIt! to
skip over any special language extensions such as embedded SQL, or key
external routines with specific syntax. Of course you may conclude that
this would limit the level of obscuring in the process, but there is
nothing to stop you not only obscuring your source code, but also your
database tables as well!
Once you deploy your secured system, ShroudIt! provides you with MAP
files which cross reference between the original source and the
obfucated text. These facilitate providing debugging and support for
the deployed system.
As with any process you need to determine a balance between your
business goals and technical needs. ShroudIt! provides a tool which
gives you more options in achieving that balance.
Some extra business support functions that ShroudIt! includes are
automatic prefixing of copyright notices to source, along with copy
branding. The branding works by automatically generating a serial
number using a hash scheme. You provide the name of the end user and
this is hashed to produce a serial number. This serial number is then
used to seed the random number generator. Doing this means each
resultant source output is uniquely identifiable, even if your original
files are tampered with or incorporated into other source.
The following section summarizes the feature set that ShroudIt! provides.
----- ShroudIt! Features ----------------------------------------------
ShroudIt! features can be divided into three distinct levels. Each
level is shown, first with the key functions performed, then followed by
the main components that allow this, and after that special control
parameters that specify the exact details.
Level One - (base level)
- Variable name substitution and comment stripping
- Components
Language key words dynamically definable
External and global function key words dynamically definable
Comment syntax dynamically definable
- Parameters
Regular line, complex nested, or simple block comments
Compiler directives handling
Minimum length for random names
Join character for name tokens
Repeated use of name across code blocks obfuscation
Code block delimiter tokens
Registration and serial number branding
Random number seeding control
Duplicate token name checking
String text delimiters
Continuation line syntax
Level Two - (extended level)
- Include file expansion, number and string constant replacement.
(Supports use of includes within includes to any depth).
- Components
Include or copy book language syntax definition
Language syntax for replacing numbers and strings
- Parameters
Supports compiler environment variables for include file paths
Optionally exclude certain system includes or copy books
Language syntax for ASCII code substitution
Level Three - (maximum level)
- Source compression and language keyword substitution
- Components
Language key words dynamically definable
External function key words dynamically definable
Include or copy book language syntax definition
- Parameters
Compression line length
Compression exclusions
Continuation line syntax
Randomly generated replacement names
Occasional special token replacement
Finally as needed you can use the in-line &&ShroudIt! parameter to pass
on the fly instructions to the shrouder at critical points within a
particular source file. These override the default values specified by
the parameter rules.
===== Warranty =========================================
Warranty
▀▀▀▀▀▀▀▀
THE SHROUDIT! PRODUCT IS LICENSED "AS IS" WITHOUT ANY WARRANTY OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, PERFORMANCE, OR
OTHERWISE. ALL WARRANTIES ARE EXPRESSLY DISCLAIMED. BY USING THE
SHROUDIT! PRODUCT, YOU AGREE THAT NEITHER LNK CORPORATION, INC. NOR ANY
OFFICERS, DIRECTORS, EMPLOYEES, SHAREHOLDERS, AFFILIATES, OWNERS, OR
OTHER RELATED PARTIES WILL BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY
USE OF (OR INABILITY TO USE) OR PERFORMANCE OF THIS PRODUCT, OR FOR ANY
DAMAGES WHATSOEVER WHETHER BASED ON CONTRACT, TORT OR OTHERWISE EVEN IF
WE ARE NOTIFIED OF SUCH POSSIBILITY IN ADVANCE. (SOME STATES DO NOT
ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL
DAMAGES, SO THE FOREGOING LIMITATION MAY NOT APPLY TO YOU.)
This agreement shall be governed by the laws of the State of Maryland
and shall inure to the benefit of LNK Corporation, Inc. and any
successors, administrators, heirs and assigns. Any action or proceeding
brought by either party against the other arising out of or related to
this agreement shall be brought only in a STATE or FEDERAL COURT of
competent jurisdiction located in Prince George's County, Maryland. The
parties hereby consent to in personam jurisdiction of said courts.
===== License for Use and Distribution =================
License Agreement
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
ShroudIt! and its related programs are NOT public domain or freeware!
The Shroudit! package is a copyrighted software product developed and
owned by LNK Corporation, Inc, with patent application pending.
This software and accompanying documentation are protected by United
States copyright law and also by international treaty provisions.
The ShroudIt! product is provided on a 60 day evaluation. However to
distribute the obfuscated source code that ShroudIt! produces you MUST
obtain a license agreement from LNK Corporation Inc.
Refer to the ORDER form enclosed in the ShroudIt! documentation for
details of the different licenses available. All payments must be in
U.S. dollars.
Upon receipt of your license fee, a signed license agreement for
distribution of products created with ShroudIt! will be sent to you. In
addition, you will be entitled to technical support and future releases
at a reduced price.
You may not use, copy, rent, lease, sell, modify, decompile,
disassemble, otherwise reverse engineer, or transfer the licensed
program except as provided in this agreement. Any such unauthorized
use shall result in immediate and automatic termination of this license.
All rights not expressly granted here are reserved to LNK Corporation,
Inc.
Shareware disk distributors, computer user groups and computer bulletin
boards may distribute the unlicensed version of ShroudIt! without a
distribution license provided the ShroudIt! package is not modified, and
a fee not to exceed $15 is charged for such distribution.
LIMITED DISTRIBUTION LICENSE
The following may distribute ShroudIt!, completely unaltered, without
further permission...; for other cases or to distribute in modified
form, you must consult the attached data record, which is hereby
incorporated by reference. Any distribution satisfying all the
distribution requirements expressed in that data record is hereby
authorized.
Permission to distribute the ShroudIt! package is not transferable,
assignable, saleable, or franchisable. Each vendor wishing to
distribute the package must independently satisfy the terms of this
limited distribution license.
U.S. Government Information: Use, duplication, or disclosure by the
U.S. Government of the computer software and documentation in this
package shall be subject to the restricted rights applicable to
commercial computer software as set forth in subdivision (b)(3)(ii) of
the Rights in Technical Data and Computer Software clause at
252.227-7013 (DFARS 52.227-7013). The Contractor/manufacturer is
LNK Corporation, Inc, Riverdale, Maryland 20737.
LNK Corporation, Inc may revoke any permissions granted here, by
notifying you in writing. All rights not expressly granted here are
reserved to LNK Corporation, Inc.
===== Compressed Data Record Follows ===================
PK