记得我有个非常好的朋友曾经向我大倒苦水,原来他加了半个月的夜班,给别人开发了一套PHP程序,结果遇到了奸商,人家收了源代码说是先测试,然后就消失不见了,电话打不通,QQ也永远不在线了。
仔细想来,使用PHP开发的程序,都是源代码,辛辛苦苦写出来,任何人都可以拿去随便用随便改,这确实是个头疼的问题.
1,那么要怎么加密自己的php代码?
2,让加密的php代码在别人的电脑上也可以运行.
回复讨论(解决方案)
自己搞一个空间, 要测试的时候, 放自己的空间上。
加密的还是可以破解的,可以自己弄个站把代码上传到上面,别人可以通过域名查看效果,等他付费了再把源码给他
加密的还是可以破解的,可以自己弄个站把代码上传到上面,别人可以通过域名查看效果,等他付费了再把源码给他
加密的还是可以破解的,可以自己弄个站把代码上传到上面,别人可以通过域名查看效果,等他付费了再把源码给他
加密的还是可以破解的,可以自己弄个站把代码上传到上面,别人可以通过域名查看效果,等他付费了再把源码给他
如果代码没加密,他不是可以通过页面另存为将代码,图片,脚本下载下来?
加密的还是可以破解的,可以自己弄个站把代码上传到上面,别人可以通过域名查看效果,等他付费了再把源码给他
另存为的代码也只是页面html的,php的又看不到,不然程序员不悲催了
加密的还是可以破解的,可以自己弄个站把代码上传到上面,别人可以通过域名查看效果,等他付费了再把源码给他
另存为的代码也只是页面html的,php的又看不到,不然程序员不悲催了
好吧,话说要怎么实现下面的功能?
1,那么要怎么加密自己的php代码?
2,让加密的php代码在别人的电脑上也可以运行.
对 php 代码加密有专业的加密软件(收费的),加密后的代码要在相应的解密环境中运行
对 php 代码预编译有 zend 的预编译工具(收费,但有盗版的),预编译代码同样需要有 zend 的虚拟处理机
对 php 代码做扰码处理,扰码可理解为自解密的加密,运行时没有特殊要求
无论你做什么处理,客户总是要拿到能运行的代码的。至于客户用此代码做了什么不该做的事情,只有寻求法律的保护了
尽管中国人很聪明,但由于缺乏法律意识,在科技领域总是落后与美国人、日本人.....
可以用md5来加密吗?加密后可以破解吗?
md5 不是加密,所以也无解密一说
再说,如果对方了你加密的技术,那不就可以解密出源码了吗?那么加密还有什么意义呢?
放自己空间测试,测试好了再给。或是走担保交易啊。
function encode_file_contents($filename) {
$type = strtolower ( substr ( strrchr ( $filename, '.' ), 1 ) );
if ('php' == $type && is_file ( $filename ) && is_writable ( $filename )) { // 如果是PHP文件 并且可写 则进行压缩编码
$contents = file_get_contents ( $filename ); // 判断文件是否已经被编码处理
$contents = php_strip_whitespace ( $filename );
// 去除PHP头部和尾部标识
$headerPos = strpos ( $contents, ' $footerPos = strrpos ( $contents, '?>' );
$contents = substr ( $contents, $headerPos + 5, $footerPos - $headerPos );
$encode = base64_encode ( gzdeflate ( $contents ) ); // 开始编码
$encode = '";
return file_put_contents ( $filename, $encode );
}
return false;
}
// 调用函数
$filename = 'test.php';
encode_file_contents ( $filename );
echo "OK,加密完成!"?>
没有什么好方法,一般来说,只提供页面,付款后提供源码
function encode_file_contents($filename) {
$type = strtolower ( substr ( strrchr ( $filename, '.' ), 1 ) );
if ('php' == $type && is_file ( $filename ) && is_writable ( $filename )) { // 如果是PHP文件 并且可写 则进行压缩编码
$contents = file_get_contents ( $filename ); // 判断文件是否已经被编码处理
$contents = php_strip_whitespace ( $filename );
// 去除PHP头部和尾部标识
$headerPos = strpos ( $contents, ' $footerPos = strrpos ( $contents, '?>' );
$contents = substr ( $contents, $headerPos + 5, $footerPos - $headerPos );
$encode = base64_encode ( gzdeflate ( $contents ) ); // 开始编码
$encode = '";
return file_put_contents ( $filename, $encode );
}
return false;
}
// 调用函数
$filename = 'test.php';
encode_file_contents ( $filename );
echo "OK,加密完成!"?>
原来页面内容变成
eval(gzinflate(base64_decode('41JILUvM0UivysxLy0ksSdVISixONTOJT0lNzk9J1VB3LHe0VdfU1LRWsLcDAA==')));
运行效果不是原来页面的
这个要对于懂的,一般的加密都没有用的
我想要的效果是,别人看到你的源代码是乱码,但是能显示运行效果,至于容不容易破解先不考虑.
有很多PHP加密代码啊,不过都容易解~~~
破解这方面先不考虑,前面的实现了再说

PHP type prompts to improve code quality and readability. 1) Scalar type tips: Since PHP7.0, basic data types are allowed to be specified in function parameters, such as int, float, etc. 2) Return type prompt: Ensure the consistency of the function return value type. 3) Union type prompt: Since PHP8.0, multiple types are allowed to be specified in function parameters or return values. 4) Nullable type prompt: Allows to include null values and handle functions that may return null values.

In PHP, use the clone keyword to create a copy of the object and customize the cloning behavior through the \_\_clone magic method. 1. Use the clone keyword to make a shallow copy, cloning the object's properties but not the object's properties. 2. The \_\_clone method can deeply copy nested objects to avoid shallow copying problems. 3. Pay attention to avoid circular references and performance problems in cloning, and optimize cloning operations to improve efficiency.

PHP is suitable for web development and content management systems, and Python is suitable for data science, machine learning and automation scripts. 1.PHP performs well in building fast and scalable websites and applications and is commonly used in CMS such as WordPress. 2. Python has performed outstandingly in the fields of data science and machine learning, with rich libraries such as NumPy and TensorFlow.

Key players in HTTP cache headers include Cache-Control, ETag, and Last-Modified. 1.Cache-Control is used to control caching policies. Example: Cache-Control:max-age=3600,public. 2. ETag verifies resource changes through unique identifiers, example: ETag: "686897696a7c876b7e". 3.Last-Modified indicates the resource's last modification time, example: Last-Modified:Wed,21Oct201507:28:00GMT.

In PHP, password_hash and password_verify functions should be used to implement secure password hashing, and MD5 or SHA1 should not be used. 1) password_hash generates a hash containing salt values to enhance security. 2) Password_verify verify password and ensure security by comparing hash values. 3) MD5 and SHA1 are vulnerable and lack salt values, and are not suitable for modern password security.

PHP is a server-side scripting language used for dynamic web development and server-side applications. 1.PHP is an interpreted language that does not require compilation and is suitable for rapid development. 2. PHP code is embedded in HTML, making it easy to develop web pages. 3. PHP processes server-side logic, generates HTML output, and supports user interaction and data processing. 4. PHP can interact with the database, process form submission, and execute server-side tasks.

PHP has shaped the network over the past few decades and will continue to play an important role in web development. 1) PHP originated in 1994 and has become the first choice for developers due to its ease of use and seamless integration with MySQL. 2) Its core functions include generating dynamic content and integrating with the database, allowing the website to be updated in real time and displayed in personalized manner. 3) The wide application and ecosystem of PHP have driven its long-term impact, but it also faces version updates and security challenges. 4) Performance improvements in recent years, such as the release of PHP7, enable it to compete with modern languages. 5) In the future, PHP needs to deal with new challenges such as containerization and microservices, but its flexibility and active community make it adaptable.

The core benefits of PHP include ease of learning, strong web development support, rich libraries and frameworks, high performance and scalability, cross-platform compatibility, and cost-effectiveness. 1) Easy to learn and use, suitable for beginners; 2) Good integration with web servers and supports multiple databases; 3) Have powerful frameworks such as Laravel; 4) High performance can be achieved through optimization; 5) Support multiple operating systems; 6) Open source to reduce development costs.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

EditPlus Chinese cracked version
Small size, syntax highlighting, does not support code prompt function

WebStorm Mac version
Useful JavaScript development tools

Safe Exam Browser
Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.

SublimeText3 English version
Recommended: Win version, supports code prompts!

Zend Studio 13.0.1
Powerful PHP integrated development environment