home *** CD-ROM | disk | FTP | other *** search
VENDINFO | 1994-04-27 | 21.6 KB | 445 lines |
- ⁄ƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒø
- ≥ ShroudIt! source code shrouder v1.0 ≥
- ≥ SEE BELOW FOR PRODUCT INFORMATION ≥
- ¿ƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒŸ
- ⁄ƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒø
- ≥ This is a VENDINFO Product Information Record ≥
- ≥ ≥
- ≥ This record is a means of conveying information about a software ≥
- ≥ product from the author to distributors and users. It contains a ≥
- ≥ normal, "human-readable" section (you're reading it now), followed ≥
- ≥ by a compressed data record. The data record contains a great ≥
- ≥ deal of information in a form useable by automated tools. This ≥
- ≥ allows BBSes, disk vendors, etc. to test automatically for ≥
- ≥ permission to distribute, and to automatically extract product ≥
- ≥ information for use in BBS files databases, vendor catalogs, etc. ≥
- ≥ ≥
- ≥ The VENDINFO file standard is published and is freely useable. ≥
- ≥ ≥
- ≥ The VENDINFO toolset includes a free end-user viewer, processing ≥
- ≥ tools for use by distributors (BBSes, shareware disk vendors, ≥
- ≥ etc.), and the editor used by author/publishers to produce these ≥
- ≥ records. These tools are either free or very-low cost shareware. ≥
- ≥ The toolset can be obtained from many sources, including the ≥
- ≥ originators of VENDINFO: ≥
- ≥ ≥
- ≥ Rams' Island Software Voice: 303-841-2848 CompuServe: 76244,324 ≥
- ≥ 7644 E. Lakecliff Way BBS: 303-841-6269 FidoNet: 1:104/333 ≥
- ≥ Parker, CO 80134-5904 USA RIME: RAMSISLE ≥
- ¿ƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒŸ
- VENDINFO standard v1.00, produced by VendEdit v1.00, 27-Apr-1994
-
- ===== Product Information ==============================
- Product: ShroudIt! source code shrouder
- Version: 1.0
- Version Date: 29-Apr-1994
- Product Type: Software
- Basic Distribution Policy (see License, below, for details):
- "Commercial" product, intended for distribution with other s/w
-
- Product Description: ShroudIt! source code shrouder v1.0, works
- for any programming language. MUST HAVE tool
- for any serious professional programmer.
- Allows you to protect your source code,
- provide protected toolkits and libraries,
- port source across platform on customers
- site, and so on. Patent pending templating
- works for 'C', Pascal, dBase, BASIC, COBOL,
- SQL, Prolog, PERL and more. Tutorial and
- manual provided on disk.
-
- Category: Programming utilities
- Keywords: ShroudIt Shroud Obfuscate C DBASE BASIC COBOL
- PASCAL PROLOG PERL SQL
- Required Packages: SHRDIT01
- This Package: SHRDIT01
-
- Required Configuration
- Processor Family: Intel 80x86 (minimum 8086/8088)
- Minimum OS: MS-DOS 3.1
- Standard RAM: 640K
-
- Orders:
- Address: LNK Corporation, Inc.
- 6811 Kenilworth Ave,
- Suite #306,
- Riverdale,
- Maryland, 20737,
- USA
- Phone: (301)-927-3223
- FAX: (301)-927-7193
- CompuServe: 72030,1547
- Internet: drrwebber@acm.org
- Other E-mail: drrwebber@acm.org
-
- Support:
- Address: LNK Corporation, Inc.
- 6811 Kenilworth Ave,
- Suite #306,
- Riverdale,
- Maryland, 20737,
- USA
- Phone: (301)-927-3223
- FAX: (301)-927-7193
- CompuServe: 72030,1547
- Internet: drrwebber@acm.org
- Other E-mail: drrwebber@acm.org
-
-
- ===== Information for Users ("READ-ME") ================
-
- ShroudIt! source code obfuscation: **NEW** Version 1.0
-
- from LNK Corporation, Inc, Riverdale, Maryland, a high technology company
- providing innovative information technology solutions for over 25 years.
-
- This is a comprehensive source code shrouder, using a patent pending
- system that allows obfuscation of practically any computer language
- system.
-
- ShroudIt! is designed to handle modern computer languages with support
- for such things as compiler directives, global includes, macros,
- embedded pre-processor statements, and symbol defines.
-
- Source code processed by ShroudIt! is fully equivalent to the original
- code, except that it is now only machine readable. All comments and
- meaningful variable names are removed or replaced.
-
- This means you can distribute your source code for others to use and
- compile, but your intellectual property is secured and protected.
-
- There are over 30 available features and optional techniques, such as
- replacing string constants with their ASCII hex code equivalence to
- further obscure the meaning and sense of the original source program.
-
- ShroudIt! is an essential tool whenever the security of your original
- source code may be compromised. This makes it a MUST HAVE tool for
- any serious professional programmer.
-
- ShroudIt! means you no longer have to give away your best ideas free,
- especially in fully interpeted environments like the PERL language,
-
- Comes with a fully featured INTRO tutorial program, an on disk manual,
- and sample templates for 'C', Pascal, dBase, BASIC, COBOL, SQL, Prolog
- and PERL source code..
-
- Requires: MS/DOS 3+, 640k RAM and 8086/8088 system or better.
-
- ========================================================================
-
-
- ===== Packing List =====================================
-
- As released by the author or publisher, this package contained the
- following files in addition to this VENDINFO.DIZ:
-
- Filename Size Date Time CRC32
- !README. 65 5-Apr-1994 06:31p 214C3F05
- HINTS. 2049 8-Apr-1994 11:52a 6618CB17
- INTRO. 1029 5-Apr-1994 03:29p 580DB8F2
- LICENSE. 2521 23-Apr-1994 05:58p 8A71FC30
- LOGO. 497 5-Apr-1994 03:25p 51DF3646
- ORDER. 2086 5-Apr-1994 06:21p 6C459820
- OVERVIEW. 1342 5-Apr-1994 03:34p B763CBA9
- LOAD.C 1160 10-Mar-1994 01:30p C7556EED
- SH-C.CPY 487 5-Apr-1994 06:08p 7F824BB2
- SH-C.CTL 1020 30-Mar-1994 06:01p A005DDE1
- SH-LOW.CTL 709 5-Apr-1994 03:50p 6C3B85F9
- FILE_ID.DIZ 424 27-Apr-1994 11:38a FAF4E1C4
- SHROUDIT.DOC 37817 23-Apr-1994 05:55p 1C496FC5
- INTRO.EXE 145984 7-Apr-1994 06:55p 7ED97041
- SHROUDIT.EXE 180368 22-Apr-1994 09:37p 8076BE45
- SH-C.GLB 34 5-Apr-1994 06:30p 895E0338
- SH-C.INC 20 28-Feb-1994 06:30p 0877BDDB
- SH-C.KEY 907 28-Mar-1994 03:16p A97877EF
- SH-LOW.KEY 907 28-Mar-1994 03:16p A97877EF
- SH-SQL.KEY 386 6-Apr-1994 05:51p 195339C0
- PACKING.LST 1843 8-Apr-1994 12:01p C7A4103C
- SH-C.OBS 117 3-Mar-1994 06:26p 129C1D5A
- INTRO.POP 1530 5-Apr-1994 06:25p 21FC850C
- SHROUDIT.PRO 55835 22-Apr-1994 09:28p 6BFC0799
- DESC.SDI 37 27-Apr-1994 11:38a C3DFDB6A
- SHROUDIT.SHR 17513 22-Apr-1994 09:28p C1474A6A
- BASIC.ZIP 766 7-Apr-1994 04:03p 9F37692D
- COBOL.ZIP 1443 5-Apr-1994 03:38p 3B527B90
- DBASE.ZIP 871 12-Apr-1994 01:26p C1F7CC53
- EXAMPLES.ZIP 1797 5-Apr-1994 03:39p F649DCAD
- PASCAL.ZIP 1368 5-Apr-1994 11:30p A4EB3D1E
- PERL.ZIP 1088 18-Apr-1994 06:16p 548E4839
- PROLOG.ZIP 2749 5-Apr-1994 03:38p 69B41574
-
-
- ===== Installation =====================================
-
- ShroudIt! is provided as a single PKZIP file. Unpack this into
- a single directory, run the INTRO tutorial, and then read the
- manual (SHROUDIT.DOC). You should then be ready to try some of your
- own source code using the example template control files provided.
-
- The whole process will vary in complexity from as simple as re-compiling
- say Borland C under Microsoft C, or at the high end, like using AWK
- scripts to tailor the final result required.
-
- Remember ShroudIt! only works on clean compiled and debugged code.
-
- ShroudIt! can be placed on the system path for execution, and you can
- optionally co-locate control files with source, or centrally with
- the ShroudIt! program. There are also environment variables you can
- set. This gives you all the flexiblity you need when working with
- a massive system of hundreds of source code modules split over
- a directory tree.
-
-
-
- ----- History ------------------------------------------------------
-
- As a company we develop custom AI and Image Processing solutions and
- integrate them into traditional application systems.
-
- ShroudIt! was developed to protect our own source code library on a Sun
- UNIX system for a CNAPS massively parallel processor. The CNAPS has its
- own unique dialect of C and as yet no object linking capability. Our
- patent pending LNK_ImageLib graphical image processing product used in
- combination with the CNAPS processor gives a stunning improvement to
- automated satellite imagery processing. What used to take 8 hours to do
- on a high end RISC workstation, can now be done in real time in under 3
- minutes. We would be happy to discuss any image processing needs you
- have too.
-
- Just a reminder that our licensing terms allow you to work with
- ShroudIt! free of charge for up to 60 days. However, at the moment that
- you distribute product created using ShroudIt! you must have purchased
- an applicable license from LNK Corporation, Inc. See ordering details
- in the accompanying ORDER file on disk.
-
- ----- Obfuscating ---------------------------------------------------
-
- ShroudIt! is designed to be used whenever you are concerned that the
- security of your original work could be compromised or you want to
- protect your intellectual property. ShroudIt! uses a patent pending
- rule based system implemented in Prolog that allows you to obfuscate
- practically any part of your original work. The obfuscation changes
- your original so that a human reader is unable to discern the sense or
- meaning, but the computer interprets it EXACTLY equivalent to the
- original.
-
- All the features and techniques are controlled by externally definable
- rules, so the entire process can be tailored to a specific target
- source language of your choice. Of course we cannot guarantee that
- ShroudIt! will work with absolutely any source, but with careful tuning
- it should cover most of the major language systems in use today.
-
- The degree of obfuscation consists of three distinct levels. At the
- base level the core scrambling is achieved by replacing all variables by
- meaningless random strings instead. Additionally any text inside
- comments is discarded. This level of obfuscation will work with almost
- any language.
-
- The next level allows you to expand any copy book or included source code
- in-line into the main source body. In addition you can replace any
- numeric or string constants with tokens instead. This is done by
- declaring the tokens to be equivalent to the number or text, and the
- text can be optionally written as raw ASCII codes if the target language
- supports this.
-
- The final level both compresses the source and replaces keywords with
- random tokens. Again this is only possible where the target language
- syntax is not dependent on line numbers and white space (or end of line)
- significance, and has some kind of macro or pre-processor facility.
-
- You can use the INTRO program provided to review an example of each
- level when used against a small sample 'C' language source program.
-
- The key to successfully using ShroudIt! is to customize the rule set
- to match your requirements. Several examples are provided for you to
- work from. The strength in this method is that you can set ShroudIt! to
- skip over any special language extensions such as embedded SQL, or key
- external routines with specific syntax. Of course you may conclude that
- this would limit the level of obscuring in the process, but there is
- nothing to stop you not only obscuring your source code, but also your
- database tables as well!
-
- Once you deploy your secured system, ShroudIt! provides you with MAP
- files which cross reference between the original source and the
- obfucated text. These facilitate providing debugging and support for
- the deployed system.
-
- As with any process you need to determine a balance between your
- business goals and technical needs. ShroudIt! provides a tool which
- gives you more options in achieving that balance.
-
- Some extra business support functions that ShroudIt! includes are
- automatic prefixing of copyright notices to source, along with copy
- branding. The branding works by automatically generating a serial
- number using a hash scheme. You provide the name of the end user and
- this is hashed to produce a serial number. This serial number is then
- used to seed the random number generator. Doing this means each
- resultant source output is uniquely identifiable, even if your original
- files are tampered with or incorporated into other source.
-
- The following section summarizes the feature set that ShroudIt! provides.
-
-
- ----- ShroudIt! Features ----------------------------------------------
-
- ShroudIt! features can be divided into three distinct levels. Each
- level is shown, first with the key functions performed, then followed by
- the main components that allow this, and after that special control
- parameters that specify the exact details.
-
- Level One - (base level)
-
- - Variable name substitution and comment stripping
-
- - Components
- Language key words dynamically definable
- External and global function key words dynamically definable
- Comment syntax dynamically definable
-
- - Parameters
- Regular line, complex nested, or simple block comments
- Compiler directives handling
- Minimum length for random names
- Join character for name tokens
- Repeated use of name across code blocks obfuscation
- Code block delimiter tokens
- Registration and serial number branding
- Random number seeding control
- Duplicate token name checking
- String text delimiters
- Continuation line syntax
-
- Level Two - (extended level)
-
- - Include file expansion, number and string constant replacement.
- (Supports use of includes within includes to any depth).
-
- - Components
- Include or copy book language syntax definition
- Language syntax for replacing numbers and strings
-
- - Parameters
- Supports compiler environment variables for include file paths
- Optionally exclude certain system includes or copy books
- Language syntax for ASCII code substitution
-
- Level Three - (maximum level)
-
- - Source compression and language keyword substitution
-
- - Components
- Language key words dynamically definable
- External function key words dynamically definable
- Include or copy book language syntax definition
-
- - Parameters
- Compression line length
- Compression exclusions
- Continuation line syntax
- Randomly generated replacement names
- Occasional special token replacement
-
- Finally as needed you can use the in-line &&ShroudIt! parameter to pass
- on the fly instructions to the shrouder at critical points within a
- particular source file. These override the default values specified by
- the parameter rules.
-
-
- ===== Warranty =========================================
-
- Warranty
- flflflflflflflfl
-
- THE SHROUDIT! PRODUCT IS LICENSED "AS IS" WITHOUT ANY WARRANTY OF
- MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, PERFORMANCE, OR
- OTHERWISE. ALL WARRANTIES ARE EXPRESSLY DISCLAIMED. BY USING THE
- SHROUDIT! PRODUCT, YOU AGREE THAT NEITHER LNK CORPORATION, INC. NOR ANY
- OFFICERS, DIRECTORS, EMPLOYEES, SHAREHOLDERS, AFFILIATES, OWNERS, OR
- OTHER RELATED PARTIES WILL BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY
- USE OF (OR INABILITY TO USE) OR PERFORMANCE OF THIS PRODUCT, OR FOR ANY
- DAMAGES WHATSOEVER WHETHER BASED ON CONTRACT, TORT OR OTHERWISE EVEN IF
- WE ARE NOTIFIED OF SUCH POSSIBILITY IN ADVANCE. (SOME STATES DO NOT
- ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL
- DAMAGES, SO THE FOREGOING LIMITATION MAY NOT APPLY TO YOU.)
-
- This agreement shall be governed by the laws of the State of Maryland
- and shall inure to the benefit of LNK Corporation, Inc. and any
- successors, administrators, heirs and assigns. Any action or proceeding
- brought by either party against the other arising out of or related to
- this agreement shall be brought only in a STATE or FEDERAL COURT of
- competent jurisdiction located in Prince George's County, Maryland. The
- parties hereby consent to in personam jurisdiction of said courts.
-
-
- ===== License for Use and Distribution =================
-
- License Agreement
- flflflflflflflflflflflflflflflflfl
-
- ShroudIt! and its related programs are NOT public domain or freeware!
- The Shroudit! package is a copyrighted software product developed and
- owned by LNK Corporation, Inc, with patent application pending.
- This software and accompanying documentation are protected by United
- States copyright law and also by international treaty provisions.
-
- The ShroudIt! product is provided on a 60 day evaluation. However to
- distribute the obfuscated source code that ShroudIt! produces you MUST
- obtain a license agreement from LNK Corporation Inc.
-
- Refer to the ORDER form enclosed in the ShroudIt! documentation for
- details of the different licenses available. All payments must be in
- U.S. dollars.
-
- Upon receipt of your license fee, a signed license agreement for
- distribution of products created with ShroudIt! will be sent to you. In
- addition, you will be entitled to technical support and future releases
- at a reduced price.
-
- You may not use, copy, rent, lease, sell, modify, decompile,
- disassemble, otherwise reverse engineer, or transfer the licensed
- program except as provided in this agreement. Any such unauthorized
- use shall result in immediate and automatic termination of this license.
- All rights not expressly granted here are reserved to LNK Corporation,
- Inc.
-
- Shareware disk distributors, computer user groups and computer bulletin
- boards may distribute the unlicensed version of ShroudIt! without a
- distribution license provided the ShroudIt! package is not modified, and
- a fee not to exceed $15 is charged for such distribution.
-
- LIMITED DISTRIBUTION LICENSE
-
- The following may distribute ShroudIt!, completely unaltered, without
- further permission...; for other cases or to distribute in modified
- form, you must consult the attached data record, which is hereby
- incorporated by reference. Any distribution satisfying all the
- distribution requirements expressed in that data record is hereby
- authorized.
-
- Permission to distribute the ShroudIt! package is not transferable,
- assignable, saleable, or franchisable. Each vendor wishing to
- distribute the package must independently satisfy the terms of this
- limited distribution license.
-
- U.S. Government Information: Use, duplication, or disclosure by the
- U.S. Government of the computer software and documentation in this
- package shall be subject to the restricted rights applicable to
- commercial computer software as set forth in subdivision (b)(3)(ii) of
- the Rights in Technical Data and Computer Software clause at
- 252.227-7013 (DFARS 52.227-7013). The Contractor/manufacturer is
- LNK Corporation, Inc, Riverdale, Maryland 20737.
-
- LNK Corporation, Inc may revoke any permissions granted here, by
- notifying you in writing. All rights not expressly granted here are
- reserved to LNK Corporation, Inc.
-
-
- ===== Compressed Data Record Follows ===================
-
- PK