djuga wrote: ↑23 Oct 2020, 09:39
Anybody know how protect ahk program from http debugger?
Im use google spreadsheets like database
Seems like you want to hide the communication between your AHK program and a remote server. It's not possible to hide that your program is talking to a remote server. They can see and figure out that you are communicating with Google servers.
At best, you can encrypt the traffic between your program and the remote server. Even then, various things about what's going on can be figured out.
Maybe you have idea how use IsDebuggerPresent in ahk?
This is a different thing. Here, it appears you want to prevent people from figuring out what your AHK program is doing or protect source code. AHK is an interpreted programming language (like C#, Java, Python, JavaScript...). You will have to use encryption or obfuscation to protect your source code. For AHKers, that would be something like AutoHotkey_H (
https://www.autohotkey.com/boards/viewforum.php?f=65) or Encryptor by FeiYue (
https://www.autohotkey.com/boards/viewtopic.php?t=42494) for AutoHotkey_L. AutoHotkey_H has some anti-debugger protection, while Encryptor does not.
Furthermore, skilled hackers/crackers have various ways to defeat IsDebuggerPresent, that is openly discussed across the Internet. In addition, an interpreted programming language is far more vulnerable to hacking/cracking, than a compiled language (C, C++, Pascal/Object Pascal, Go...). Even if you wrote in a compiled language, that will not stop cracking, just makes it a bit harder.
At best, you can only make it inconvenient for casuals to want to be bothered trying to crack your program, not stop skilled or professional programmers. Nothing wrong with adding a bit of protection from casuals, like installing a lock on the door of your house. However, don't have the mindset that by putting a lock on the door that it is now impossible for thieves and criminals to ever get in. There should be no expectation of making a program hackerproof or uncrackable. Like the lock on the door and a break in, you need to pursue legal means. For software, that would be getting a lawyer, taking people to court, going after ISPs that allow websites to host copyrighted or trademark infringing material, and/or reporting cracked versions of your program as malware to Anti-Virus companies (that's why SHA hashing is important). Also, the vast majority of people will be law abiding, so really you are talking about a small percentage that go the route that you might be worrying (too much) about.