Unleash Your Potential - Namagunga Girls Coding Club
How to prevent cyber terrorism taragana
1. Breaking News Entertainment Gadgets Sports PR News WordPress Freebies Shopping Mall
« Deal of the Day: Get a Pen, Stylus, Laser Pointer, LED Flashlight and UV
Light within $10!!!
Apple Releases iPhone 2.2 Software Update - Happy Holidays! »
Voted
11
Angsuman Chakraborty November 22nd, 2008
Topics (map)
» News (1973)
» Web (1916)
» Technology
(1252)
» How To (910)
» Web Services
(840)
» India (689)
» Information
Technology (663)
» Microsoft (627)
» Google (609)
» Pro Blogging
(470)
Taragana
Network
Enterprise Blog
Free Book on Eye
Care by Natural
Therapy
Gadgetophilia -
Gadget guide for
gadget addicts
Hot Computer Jobs
Blog
Startup Database
Taragana - Software
Outsourcing
Blog Stats
There are currently
5,842 posts and 15,385
comments in this
weblog. Enjoy!
Translate
Subscribe by Email...
9748644 translated pages
served by Angsuman's
Translator Plugin Gold
since May 2007.
Cache hit : 96.65%
Cache miss : 3.35%
Simple solutions for complex problems.
How to Prevent CyberTerrorism and Software Piracy
Through Validy SoftNaos - A Technical Perspective
Cyber terrorism, data theft
and piracy are three of the
most concerning factors for
any software developer or a
learned internet user. We
have always looked forward
to numerous softwares as
they claim to prevent any
trespasser but in vain. None
of them have been efficient
enough and that is the
reason why we are here to
tell you about a new and
unknown technology, Validy
Softnaos (which was given to us to for reviewing purpose and have a
technological insight) It uses a hardware-software bridge that works efficiently
to prevent any unauthorized activity.
What is Validy Technology
Validy Technology (VT) is a system which protects software against piracy and
ensures software integrity. It uses a combination of software compilation
techniques and of a small secure hardware device called a token. If you look
at this following pic, you will understand the technology behind Validy's.
You can see that there is a co-processor that works under a Secure Token (an
USB dongle) and executes the program there itself
Validy Softnaos
Validy SoftNaos for Java is a software protection product targeted at
software publishers who develop Java applications. It prevents software
piracy and ensures software integrity by combining software transformation
with a piece of secure hardware (a secure token of USB dongle).
How Does it Work
To perform the protection by Validy SoftNaos for Java, a post-compiler
transforms the Java bytecode of the application. Unless a Validy SoftNaos
USB token is attached to the PC, the protected application can not run
anymore.
At runtime, the token becomes an extension of the main processor. It
contains a subset of the application's state and executes the parts of the
application that use or modify this state.
The token is a slave co-processor, receiving a flow of encrypted instructions
and exchanging data with the main processor through the USB interface.
The whole concept of Validy Softnaos protection works on enciphering and
deciphering of encryption. Because the only link between a protected
application and the token is a cryptographic key. The post-compiler
enciphers instructions using a secret key at protection time and the token
deciphers them at runtime using the same key.
Protection over Data in Co Processor (Technical Aspect)
How to Prevent CyberTerrorism and Software Piracy Through Validy S... http://blog.taragana.com/index.php/archive/how-to-prevent-cyberterror...
1 sur 4 05/09/2010 10:42
2. Poll
What is your favorite Open Source
Database
MySQL
PostgreSQL
Firebird
GNU SQL Server
SAP MaxDB
ScimoreDB
DXstore database system
HSQLDB
CloudDB
Other (please specify in comments
below)
View Results
Comments
Show all Polls
Latest Tweets
How To
ronpruett If you need rtention in your group I know how to know how to
do it.
namurien Learn How To Live Off The Grid http://bit.ly/Q8vsX
thisuserexists Just updated my blog @ articles24.com :-) How To Make
Money As A Kid Online? http://tinyurl.com/yjm2gzq
gottchacheater How To Come Back Stronger Than Ever After Infidelity
http://bit.ly/17Cbq3
ReneMGuru Internet Marketing 101: How to increase cause email efforts:
Several email marketing businesses can help market.. http://bit.ly/vuPCp
Berthavsksy How to you make a dish washer into a snow blower? Give the
bitch a shovel
_beccaboo_ Man I wish my chemistry teacher knew how to write proper
instructions. Confused. I'll figure it out eventually though.
JimmyJames70 For some reason I'm getting flashbacks of Jeremy Giambi
forgetting how to slide in an A's playoff game from many years ago
paulosuzart how to pass an http session to #lift session? i will try to mock
it. :)
Claim
Blogussion Claim Your Facebook Fan Page Username http://bit.ly/ljjHA
APCPro We'd like to give a mini gallery wrap to 5 APC tweeps that help
fight diabetes w/ @rhedpixel http://bit.ly/4iBNrs DM 2 claim.
imabima planning to go to the Claim Company at Northbrook Court for
lunch tomorrow. The whole world is telling me it's the greatest.
wiselark Waitangi 262 claim for cultural and intellectual property affects
Archives [along with @NLNZ and @TePapa] #lianza09
JamesPinnell Amazon claim "higher operating costs outside the US" for a
40% increase in costs for Aussie Kindle. Umm, what? http://is.gd/4eFPU
GameTheSystem Twitter Nope Were Not Doing Video Tweets: We
commented a few hours ago on a claim in the Telegraph newspaper th..
http://bit.ly/NxuYO
elpie Sorting out insurance claim for the storm damage. Shame we can't
claim for trees and destroyed plants.
KingMikeMac I commented on a YouTube video -- laci, what is this I hear
about you filing a false DMCA claim because... http://bit.ly/3aCvZz
Latest Friend Feeds
Technology
petrbuben Training to Climb an Everest of Digital Data
petrbuben Link by Link: Is It a Day to Be Happy Check the Index
petrbuben Closing the Deal at the Virtual Checkout Counter
tombiro Powermat Cuts the Cord
seyedkamal 2006 � �!! // http://www.guardian.co.uk/technology
/2006/oct/11/news.iran // // ...
livechina China Techfaith Wireless Communication Technology Up 113.4%
Since smartrend's ... - FOXBusiness
erikmitk [Geeks Are Sexy] Technology News - We make technology sexy
randomnescence 13th Rajiv Gandhi Science and Technology lecture
organised - Times of India
ludtke Twitter to introduce live video-tweeting
mattis RT @yorkshireforum #classified ads, #discussions, #technology
help, #video forums,#joke forum,
#leeds,#sheffield,#doncaster,#york,#bradford
deeped 50 things that are being killed by the internet - Telegraph
pacepe How Google Wave could transform journalism | Technology | Los
Angeles Times
hanifisko i am tired using technology
ksna - POS ...
cashflowco Who might see the value of receiving mental health services via
"live" web casted therapy sessions.
cantorjf Tiny 'nuclear batteries' unveiled - BBC NEWS
petrbuben Tough choices for feds giving out broadband money
ruv TwittMaster.Com � Technology as of October 11, 2009
jamesketchell NewScientist #Innovation: The #psychology of #Google
Wave (http://bit.ly/3629QM) #GoogleWave #human #brain #mind
#technology
wonojo @adrt80 for what i've paid on the n96 i was really hoping the
technology wouldn't be obsolete in less than a year. nokia makes me sad.
Java Software
The protection of an application with Validy Technology begins with the
relocation of some of the instance and static fields of some of its classes
inside the memory of the secure coprocessor. When such a transformed class
is loaded or such a transformed object is created, a chunk of memory is
allocated in the heap of the coprocessor to hold the values of the relocated
fields. In the transformed classes, the relocated instance and static fields are
replaced by the address of these chunks of memory. These addresses are
stored in two fields named k$this and k$class for instance and static fields
respectively. Figure 3.1 shows an object of class A and its fields before and
after the relocation of two fields to the coprocessor.
What's More?
What I liked the most about this product was its use of tags. The tags
mechanism is easy to implement and runs fast because it involves only simple
operations. It is however extremely powerful because additional instructions
can be tied to the original ones using tags.
This makes it simple, fast and yet secure.
Validy USB Token
The Validy USB token is built around a secure micro-controller running the
firmware for one or more of the following Validy applications: Validy
Softnaos, Validy WebBusiness, Validy FileCrypt, or Validy SmartLicense.
The main characteristics of the micro-controller are:
32 bit architecture
256 Kbytes of ROM (for the code)
32 Kbytes of EPROM (for permanent data)
8 Kbytes of RAM (for the working set of applications)
256 Kbytes of external ciphered RAM (used as a paging area by Validy
SoftNaos)
USB full speed interface (12 Mbit/s) Cryptographic accelerator for DES
and Triple DES
Cryptographic accelerator for RSA up to 1024 bit keys (or 2048 bits
using the Chinese Remainder Theorem)
Countermeasures to protect against physical attacks.
Advantages
* strong protection against software piracy without undue control of the
user's machine or breach of privacy
* low impact on the development and distribution of the software: protection
is mostly automated, application updates can be produced after the tokens
are in the field
* integrity checks or accesses to token cryptographic resources (for
authentication or signature) can be added and securely tied to other token
instructions
How to Install
Simply run the vldy-softnaos-eval-1.0.x.y.jar installer. After execution,
you will find the following directories under the install root location you have
chosen:
lib: The jar files for the translator, annotations, Ant task, virtual
coprocessor, and interface with the secure coprocessor.
liblibs: The third party libraries used by the translator.
doc: This evaluation guide in PDF and HTML formats.
examples: Sample applications.
To use the actual secure coprocessor, the runtime that communicates with a
hardware token instead of simulating it must be used. The jar file vldy-tech-
vruntime.jar must be replaced by vldy-tech-runtime.jar on the class
How to Prevent CyberTerrorism and Software Piracy Through Validy S... http://blog.taragana.com/index.php/archive/how-to-prevent-cyberterror...
2 sur 4 05/09/2010 10:42
3. scorpfromhell Larry Ellison - Oracle is committed to Sun - hardware,
software, Java, MySql, more R&D $$$ #oow09
intellibitz RT @Mrgareth Father of Java James Gosling says he is
"absolutely" excited about working for the #1 business software co
http://ff.im/9DHFh
intellibitz #java #job - FAT32 Software developer Software engineer
($16/hr) - http://donanza.com/t/990718 #jobs
brhubart Bob #oow09 - Gosling on Java at Oracle: "I've never worked for a
software company."
mrgareth1 Father of Java - James Gosling - says he is "absolutely" excited
about working for the number one business software company #OOW09
brhubart #oow09 - Gosling on Java at Oracle: "I've never worked for a
software company."
edans An Oyster Card has more computing power than the first computer
I wrote software for, and it runs on Java...
tonybaer For #Java best news is Java now managed by SOFTWARE
company #oow09
gotti Object-Oriented Software Engineering: Practical Software
Development using UML and Java by Robert Laganiere
intellibitz Graduate Java Developer J2EE JEE Travel Industry job in
Hertfordshire at Oho Group http://bit.ly/Dpr23 #it #software #dev
itjobstweet Graduate Java Developer J2EE JEE Travel Industry job in
Hertfordshire at Oho Group http://bit.ly/Dpr23 #it #software #dev
rezvaneh -
eddieawad Enterprise Software Development with Java: Oracle OpenWorld
Live
jamessmith24 #Java Java Swing Developer - Algorithmic Trading -
Software: My client are a technology driven software ho.. http://bit.ly
/KSP4x
tysonlundbech GetJar: Free Java, Symbian, Windows Mobile, BlackBerry,
Palm and Flash Lite mobile games and applications
projectjobs Senior Java Engineer - (Marin county/San Francisco) <
projectjobs Java J2EE Guru for Start-of-the Art NTS Software Application:
MA-Boston, Location Boston, MA; Cambridge, MA Sal.. http://bit.ly/J5PGY
ronhagenhoff Java Platform
intellibitz Exploring the world of Android :: Part 3 � JTeam Blog / JTeam:
Enterprise Java, Open Source, software solutions, Amsterdam
projectjobs Senior Software Engineer - Java - MVC - Spring - Hibernate:
CA-San Francisco, Location San Francisco, CA; South.. http://bit.ly
/1mKEDn
avec Google Friend Connect
Membres (4449) Plus »
Vous êtes déjà membre ? Connexion
path.
You can find more about running the tools here
Conclusion
Validy Technology is very competent to fight against such bigger threats but
there are some points they should consider on.
1. The documentation is too technical (though I know its for software
developers). But even a software developer can feel lost under all these
technicalities. So improvement upon documentation is a must.
2. It is too much java dependent and I will surely want it to grow over it and
be as diverse as possible.
Predictions tell us that we will have 12 million dongles attached to computers
by 2012. So you can understand that what a magnanimous influence will it
be if it becomes a success. Having said all that, Validy Softnaos is worth a try.
If you are concerned over piracy and sabotages, then you may use it and tell
us your experience too.
Filed under How To, Java Software, Programming, Software Review, Technology, Windows Software
Review | Tags: 2012, Claim, Cyber terrorism, Lost, Piracy, Validy Softnaos, Validy technology |
Comment Below | Email this Article
Windows Software Review
News
How to check what has been changed
in your Windows Registry
Firefox 3.5 Review
To-Do list ToBeeDo Review
Top 5 Free Antivirus Software
Easeus Data Recovery Wizard
Professional: Comprehensive Review
Xobni- Free Plugin Manager for
Microsoft Outlook: Review
Radmin Remote Control Software -
Overview
Top 10 Hard Drive Cloning &
Backup Software
2012 News
Outsourcing signals boom in India's publishing
industry
AP aiming for more lucrative deals with major
Web sites as offline media slump worsens
The Complete story of Who benefited and who
lost in this recession
NEC to withdraw from Japan supercomputer
project due to slump
e-Commerce Marketing is gaining momentum
due to recession
Infosys to pick up most of IBM's support
contract with Australia's Telstra
CDM Authority Goes Hitech
Intel Warns AMD on Legal Terms about
GlobalFoundries $4.2 Billion Project
Related Articles
Judge rules against Real Networks, prohibits company from marketing DVD
copying software
August 12th, 2009 Judge bars sales of RealNetworks' DVD softwareSAN FRANCISCO — DVD
copying software sold by RealNetworks Inc. appears to be an illegal pirating tool, a federal
judge ruled Tuesday in a legal battle that's been closely watched in Hollywood and
elsewhere.
Microsoft Windows Genuine Advantage Check Cracked under 24 hours
July 28th, 2005 Microsoft's effort to refuse access to updated versions of Windows Operating
System has been foiled by hackers within 24 hours. Microsoft demanded that those who
wanted Windows updates, other than security updates, will have to download an Active X
program that sniffed their operating system to see if their OS copy had been pirated.
How to prevent robots (Google Bot, MSNBot, Yahoo Slurp! etc.) from
displaying cached pages of your site
April 12th, 2005 Site Owners often detest the fact that google caches an old copy of their site
and displays it on searches which brings up the site pages. A simple way to prevent robots
(including Google, Yahoo etc.) from caching your site contents is to include the following
within the head section of your web page.
How To Prevent Search Engines Like Google & MSN Search From Using ODP
Title & Description For Site
August 23rd, 2006 Search engines like Google often fetch your site description from ODP
(Open Directory Project) description instead of fetching it from the site content or
meta-tags. This may not always be desirable as it may not represent your site properly.
India Set to be Technical Backend for All New .org Web Sites
October 4th, 2005 India’s global image and reputation is rapidly growing. Top Internet
decision makers, PIR, have decided to make India a hub for the technical backend of all
new websites, a move that is expected to significantly reduce time to resolve websites.
Compuware sells application testing software line to Britain's Micro Focus for
$80M
May 6th, 2009 Compuware sells software line to British companyDETROIT — Business
software and services provider Compuware Corp. says it's selling an applications testing
software line to Britain's Micro Focus International PLC for $80 million.
A Plan for Stopping Online Music & Book Piracy
August 14th, 2007 Online piracy is assuming alarming proportions and will continue to do so
with the popularization of internet and better bandwidth availability to customers. Online
piracy affects every material that can be moved online - music, video, books and software.
How To Use .htaccess to Prevent Apache HTTPD Directory Listing
March 16th, 2008 Apache HTTPD servers are configured by default to display directory listing,
when index files like index.htm or index.html of index.php etc. are not present in the
directory.
How to Prevent CyberTerrorism and Software Piracy Through Validy S... http://blog.taragana.com/index.php/archive/how-to-prevent-cyberterror...
3 sur 4 05/09/2010 10:42