In short, you can't. The only thing you can do is to attempt to detect the
presence of the debugger (and any modules of the B:: namespace) and terminate your script if found. This is not as trivial as it might seem.
Additionally, you'd need to at least obfuscate things sufficiently, so that people will
give up before they succeed (for example because it's just not worth it)...
The only way to make it reasonably difficult for people to work around
your mechanisms is to distribute a modified perl binary, statically
linked with the decrypting source filter module (written is XS). With anything else it's
trivial to get at your decrypted Perl source and simply disable the debugger detection.
(But even with a modified perl binary, it's only a matter of how much
time someone is willing to invest to crack your 'protection'...)
Generally - as you can infer from the Anonymous Monk's reaction - trying to hide your source is widely frowned upon in the community, so you probably won't get a lot of help here...
-
Are you posting in the right place? Check out Where do I post X? to know for sure.
-
Posts may use any of the Perl Monks Approved HTML tags. Currently these include the following:
<code> <a> <b> <big>
<blockquote> <br /> <dd>
<dl> <dt> <em> <font>
<h1> <h2> <h3> <h4>
<h5> <h6> <hr /> <i>
<li> <nbsp> <ol> <p>
<small> <strike> <strong>
<sub> <sup> <table>
<td> <th> <tr> <tt>
<u> <ul>
-
Snippets of code should be wrapped in
<code> tags not
<pre> tags. In fact, <pre>
tags should generally be avoided. If they must
be used, extreme care should be
taken to ensure that their contents do not
have long lines (<70 chars), in order to prevent
horizontal scrolling (and possible janitor
intervention).
-
Want more info? How to link
or How to display code and escape characters
are good places to start.
|