Jump to content

PHP Code | Encryption tool


Recommended Posts

I use ioncube.

http://www.ioncube.com/

 

From Ioncube

Before Encoding

Our technology first compiles your scripts to binary code. This binary format is the key to excellent security and runtime performance, and is already more secure than most alternative encoding solutions. Next, the code is optimised, reducing its size, and increasing runtime performance further.

Encoding

The compiled scripts are now turned into an ionCube Compiled Code Intermediate Format (CCIF). This proprietary format is efficient, and very different to the "known" PHP compiled format. The compiled code and other data is then protected with several layers of encoding and transformation, and turned into binary encoded files. An optional extra stage in the StandAlone Encoder transforms the binary encoded files into an ASCII representation, greatly simplifying installing between different operating systems where corruption of binary files can easily result. This important feature is one that is also missing from many competitors.

Runtime

The Loader that processes encoded files contains its own execution engine. This keeps the compiled code away from the OpenSource PHP engine, preventing any hacker from stepping through the compiled scripts when they run. Due to scripts being precompiled and the use of a highly optimised file format and Loader, runtime performance of scripts is typically accelerated when the Loader is preinstalled, and ionCube encoded files deliver performance that well exceeds the competition. See benchmarks.

Product Protection

Various techniques are used to deter or defeat attempts to understand how the Encoder and Loader work internally, either from the use of debuggers, static inspection of code or data, or tracing events at runtime. Use is also made both of non-standard and ionCube proprietary algorithms to enhance security. This is important because standard data manipulation algorithms can leave tell tale signatures in their data, giving clues to hackers about the algorithms used merely from looking at a seemingly random sequence of bytes. Whilst major competitor products make no attempt to hide these clues, a truly secure solution must tackle security at all levels, and every extra security barrier is well justified.

Link to comment
Share on other sites

This thread is more than a year old. Please don't revive it unless you have something important to add.

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Restore formatting

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.