How Hackers Crack Software

Sdílet
Vložit
  • čas přidán 7. 09. 2024

Komentáře • 504

  • @KlaroNebulous
    @KlaroNebulous Před 3 měsíci +5555

    If buying is not owning cracking isn't stealing

    • @bonkers622
      @bonkers622 Před 3 měsíci +160

      exactly

    • @Pandacier
      @Pandacier Před 3 měsíci +81

      ooooooo you're so right

    • @Daby1
      @Daby1 Před 3 měsíci +87

      Words of Wisdom

    • @user-qw9yf6zs9t
      @user-qw9yf6zs9t Před 3 měsíci +51

      no but its copyright infringement
      appearantly

    • @bonkers622
      @bonkers622 Před 3 měsíci

      @@user-qw9yf6zs9t womp womp?

  • @Circleference
    @Circleference Před 3 měsíci +1892

    1:04 THE KEY IS THE RICKROLL URL

    • @frogmasto
      @frogmasto Před 3 měsíci +64

      how did u find this out bro

    • @Circleference
      @Circleference Před 3 měsíci +321

      @@frogmasto my spidey senses were tingling

    • @wlockuz4467
      @wlockuz4467 Před 3 měsíci +128

      ​@@frogmastoIf you're old enough you remember it off the top of your head 😅

    • @frogmasto
      @frogmasto Před 3 měsíci

      @@wlockuz4467 nah i recognize it now its been pointed out, its been a while since i have been rickrolled with a link, rickrolls are sadly fading out of social media (i think) :(

    • @GRSG_tech
      @GRSG_tech Před 3 měsíci +61

      @@frogmasto others rick roll him so much that he even remember the URL

  • @RedOneM
    @RedOneM Před 3 měsíci +832

    Digital piracy/cracking is *NEVER* theft, it is just violation of copyright laws.

    • @MODEST500
      @MODEST500 Před 3 měsíci +17

      yes it is unfortunately. you are just not honest about it. coz you need a justificatiion that you are not doing something wrong

    • @KingFerx3
      @KingFerx3 Před 3 měsíci +98

      ​@@MODEST500chill nerd u talking all that crap

    • @RedOneM
      @RedOneM Před 3 měsíci +87

      @@MODEST500 justification? me doing something wrong? Where exactly did I state that?
      It‘s a simple fact that digital piracy is just a copyright violation, it is crucial to differentiate that from real theft, which actually deprives the original.
      You diminish the meaning of theft by including digital piracy under it. Reminder, there are many jurisdictions with unique rulings out in the real world.

    • @quickcinema8031
      @quickcinema8031 Před 3 měsíci +4

      Sometimes publisher let this happen as part of their shareware scheme. Like Windows and Microsoft office, the let the pirated software distributed so they can keep the market share big enough. Even a free OS like linux cannot dominate windows market share.

    • @jordanwardle11
      @jordanwardle11 Před 3 měsíci +3

      ​@@RedOneMThat's the thieves justification. That's like saying that theft from a shop is fine because "I wasn't going to buy it anyways". Stealing is stealing. Plus, "if buying isn't owning then piracy isn't stealing" then in your opinion, you don't own ANY software, even if you made it yourself.

  • @madghostek3026
    @madghostek3026 Před 3 měsíci +586

    Its cool that companies can make it increasingly difficult to crack a software, but they can never stop it, even if you had to take the program apart and construct back without piracy checks, like a theseus ship

    • @wrathofainz
      @wrathofainz Před 3 měsíci +23

      If you're lucky the company will be lazy and not fix a vulnerability in their license check function (even after being told about it) so all you have to do is cut its internet access and slap in a weird key or something.

    • @cyan2048
      @cyan2048 Před 3 měsíci +28

      They can stop it, especially if everything in the app requires server side work

    • @thomb.9013
      @thomb.9013 Před 3 měsíci

      ​@@cyan2048that's called a website.

    • @Ivanisnavi
      @Ivanisnavi Před 3 měsíci

      @@cyan2048 Servers ain't guardian angels, it's not impossible to hack servers

    • @estrawitch
      @estrawitch Před 3 měsíci +1

      yeah that's how client-side anticheats get bypassed (server-side ones are also bypassable but with different methods)

  • @foxyfoxfilms
    @foxyfoxfilms Před 3 měsíci +64

    I live in China, and here about 90% of people use hacked versions of windows, office, and adobe. I personally use them as well, because they are just so easy and they are free.

    • @niezzayt3809
      @niezzayt3809 Před 2 měsíci

      How about Photoshop 2024 ? Especially the AI tool

    • @StudentMostofaSharthok
      @StudentMostofaSharthok Před 2 měsíci

      @@niezzayt3809, that’s server-based. Hence, it cannot be cracked

    • @khai96x
      @khai96x Před 2 měsíci

      Most of the world are like this really.

    • @foxyfoxfilms
      @foxyfoxfilms Před 2 měsíci

      @@niezzayt3809 I’ve got a hacked version of ps 2024 as well

    • @user-si4to8zb7j
      @user-si4to8zb7j Před 2 měsíci

      so i will give virus anabelle.exe on config in crack app mhehehehe

  • @gir489returns2
    @gir489returns2 Před 3 měsíci +224

    I used to be in a piracy cracking group in the late 90s. You're missing a few, and that's hardware based activation, like Windows where the serial is hard-tied to basicaly a GUID which is generated with almost a spefific instruction from Intel Secure Key for Windows and the secure enclave on Mac. Many games used this back then like SecuROM which checked physical aspects of the disk against known prime values which are hard to fake, however drive emulation quickly became a thing to counter this protection. Then there's virtualization protection like VMProtect, where the assembly is obfuscated in memory until absolutely necessary, usually a trampoline is placed at the head of the function to enter the VM. Cracking VMProtect applications is an exercise in masochism, but with the right tools and enough dedication it can be done.

    • @survivalizeed
      @survivalizeed Před 3 měsíci +18

      Well this video probably doesn't want to go into that much detail. In the end you will very unlikely find an application which will be "cracked" with a simple jump patch. Having to face VMProtect or Themida is a whole different story and would make to video multiple hours long.

    • @el1teman
      @el1teman Před 3 měsíci +2

      Is there a way to find/check for malicious code for patches and keygens? Whether it contains virus or something, because some need to have anti virus paused but then how would I know what the patch actually doing

    • @survivalizeed
      @survivalizeed Před 3 měsíci +12

      ​@@el1teman No. As soon as a virus is virtualized and doesnt contain a known signature you will get infected. Thats why its important to only get keygens from community trusted websites and not from an untrusted website.
      Best thing you can do is to run it in a VM and if it doesnt start it very likely features anti vm techniques which makes the entire thing very suspicious.
      Besides from that... just buy the software ;)

    • @el1teman
      @el1teman Před 3 měsíci +1

      @@survivalizeed what about Mac viruses, are they often if download cracked software? Everyone keep praising how secure Mac OS is

    • @survivalizeed
      @survivalizeed Před 3 měsíci +2

      @@el1teman I don't use mac. Since mac is way more closed up than windows i would guess it to be more secure but still there is a risk

  • @BakrxKiNG12
    @BakrxKiNG12 Před 3 měsíci +449

    bro rickrolled and thought we wouldnt notice

  • @pseudoforceyt
    @pseudoforceyt Před 3 měsíci +296

    here before the video is taken down

  • @omentaelvis
    @omentaelvis Před 3 měsíci +193

    And yes, *this is for educational purposes only"

    • @Mcjuanse04
      @Mcjuanse04 Před 3 měsíci +33

      This literally shows nothing how to crack programs or what to do, its a superficial explanation, you should look actual tutorials on how to make viruses or reverse engineering, for * educational purposes*

    • @ParrotPentester
      @ParrotPentester Před 3 měsíci +8

      *Leaks windows 11 source code, google's database of passwords, emails and other things and doxxes every single internet user* "It's for educational purposes only"

  • @b1oodzy
    @b1oodzy Před 3 měsíci +219

    Once again, absolutely underrated. I learned more from this video than the past week at school.

    • @UltimateDillon
      @UltimateDillon Před 3 měsíci +15

      Pay attention at school then :p

    • @b1oodzy
      @b1oodzy Před 3 měsíci +4

      @@UltimateDillon I do, it's all useless information.

    • @xskii
      @xskii Před 3 měsíci +1

      what classes you in

    • @KryzysX
      @KryzysX Před 3 měsíci +1

      @@UltimateDillon lol, if only they would teach hackware in school

    • @logisec
      @logisec Před 3 měsíci +5

      @@KryzysX Low level (c/assembly) computer systems courses sure will, I learned of these methods in those courses

  • @arghyaprotimhalder5592
    @arghyaprotimhalder5592 Před 2 měsíci +9

    Photoshop is morally correct to always pirate.

    • @thekingscrown8931
      @thekingscrown8931 Před měsícem +1

      Only mfs who don't pirate adobe stuff are well paid professionals and people who bought it before it became a mothly fee

    • @ethanmartinez808
      @ethanmartinez808 Před měsícem

      ​@@thekingscrown8931 agree

  • @AAAAAAA-nh7jv
    @AAAAAAA-nh7jv Před 3 měsíci +61

    this was great, id love to see you do a vid on denuvo specifically

    • @survivalizeed
      @survivalizeed Před 3 měsíci

      Denuvo is a highly virtualized anti-tamper DRM solution which will go way above everyones head here. Take a look at the video made by sourcecodedeleted. He shows how prey (which uses Denuvo) was cracked. Not to sound rude but you will probably not understand a single thing from the video.

  • @kamil118
    @kamil118 Před 3 měsíci +147

    It's pretty interesting, but I have to be pedantic and mention that neither c# nor java are precompiled into assembly code.
    Reverse engineering c# and java code would happen in Intermediate Language or Bytecode respectively, which are not architecture specific.

    • @giannhsnt
      @giannhsnt  Před 3 měsíci +45

      I know, but they still both are converted in to machine code before being executed, and is the primary point of the graphic, I should have chosen better examples I agree.

    • @ADP4031
      @ADP4031 Před 3 měsíci +27

      @@giannhsnt Cracking C# and Java is indeed much simpler and does not require runtime debugging on the same level as required with C or C++, maybe you can make an update video or a specific topic on C# and Java, could be interesting

    • @bang1338
      @bang1338 Před 3 měsíci

      ​@@ADP4031because .NET have metadata and reflection. Same with Java.

    • @Zooiest
      @Zooiest Před 3 měsíci +2

      @@giannhsnt only if the runtime or compiler supports it. I can't speak about Java or C#, but I do know that the JavaScript engine V8 (mostly used in Chromium-based browsers and Node.js) can transform bytecode into machine code dynamically, although it's not guaranteed and might require the code path to become sufficiently "hot" prior. Bytecode executors run on machine code, yes, but code that has only been compiled into bytecode doesn't.

    • @Jaffaaaa
      @Jaffaaaa Před 3 měsíci +8

      Reverse engineering java apps is a lot more easier and a lot more fun. Most major obfuscators have public deobfuscators so you can do static analysis of near-source code fairly easily. If that's not possible or not your thing then live debugging is very easy via Java Agents, or much more solidly, JVMTI which will mean you can re-transform and create hooks in classes, even if the class is already loaded.
      Often apps will use the standard java provided classes for encryption so you can very easily hook into them using an agent to find a key for example. Another example is you could hook into the String class and check if a string is a json object. Even if this string gets encrypted later in the app, your crack can modify the contents at that point (initialisation of string) so that you spoof the sent/received body regardless of encryption being used. That's just a couple examples, there's many possibilities.

  • @arkadios1980
    @arkadios1980 Před 3 měsíci +148

    bro chill with the editing

    • @namesurname4666
      @namesurname4666 Před 3 měsíci +12

      ​@@18yhe probably means it's too good

    • @artisticyeti22
      @artisticyeti22 Před 3 měsíci

      Yup ​@@namesurname4666

    • @GrayMimikyu
      @GrayMimikyu Před 3 měsíci

      He means he kept yapping about we going to prison if we hack Photoshop... But sincerely they deserve it.

  • @enriqueisaacs8181
    @enriqueisaacs8181 Před 3 měsíci +4

    If you're going to make a monopoly of software where the average person would really need that software to experience having a PC, and then jack up the prices to where the average person cant really have a nice experience - then you're software deserves to be Luffy'd

  • @iladshyanchess
    @iladshyanchess Před 3 měsíci +6

    Wow this video is soo well made. I clicked and watched this video thinking this is a video from a larger channel. You deserve recognition.

  • @jean-naymar602
    @jean-naymar602 Před 3 měsíci +27

    You forgot the step where they (probably, maybe) add a modified dll that downloads a malicious payload from their servers :)

  • @marshalgrayson6482
    @marshalgrayson6482 Před 3 měsíci +3

    HA! I got you Denuvo, after watching this 3 minutes hacking tutorial I'll be your nightmare, be ready!

  • @EVILBUNNY28
    @EVILBUNNY28 Před 3 měsíci +12

    If buying isn’t owning, then piracy isn’t stealing

  • @homeofpain5116
    @homeofpain5116 Před 3 měsíci +1

    Bro Taught Everyone about Cracking but for Educational purpose only

  • @Mangodactyl
    @Mangodactyl Před 3 měsíci +7

    this channel looks underrated

  • @m4rt_
    @m4rt_ Před 3 měsíci +3

    Technically Java and C# compile to byte code rather than machine code.
    Machine code is what can be directly run by your CPU.
    Byte code is something that has to be run by a custom program.

  • @Its_Sebas_Yk
    @Its_Sebas_Yk Před 2 měsíci +2

    Remember; Stealing is whenever someone takes another person's property without intent to give it back. By definition, piracy is not theft because you are not taking anything from anyone.

  • @bang1338
    @bang1338 Před 3 měsíci +3

    meanwhile us:
    "If you enjoy this software, BUY IT OR REGRET IT"

  • @nameless-ix
    @nameless-ix Před 3 měsíci +2

    we had assembly code last semester and dear Lord.........even simple shit gets so complicated for the average programmers.......

    • @skylo706
      @skylo706 Před 2 měsíci +2

      I learned it myself because I was so interested in how old console games were made and learned it all bu myself. Internet resources are not that good sadly but I managed to learn it. It's more like a puzzle to solve stuff but that's what I find so satisfying about assembly. Just my personal opionion but I love it to death

  • @ibrahimdeniz7308
    @ibrahimdeniz7308 Před 3 měsíci +1

    Program securities are like a vault, if you can build one you can disassemble one

  • @solasauto
    @solasauto Před měsícem

    Just to clearify, we do not use part of the original software when we make a keygen. We debug and figure out how it is calculated and write our own.

  • @_hydrogelic
    @_hydrogelic Před 3 měsíci +4

    I took notes:
    You need a license, which really is a key, anyways, you get that key by purchasing it, but you are not purchasing it anyways, you deassemble it, reverse engineer it, see how it generates keys, and build a keygen, or maybe you just tell it to work with a wrong key.
    Then you supply the original installer with the patched dll file, congratulations, you have cracked and patched software.

  • @Biajuuu
    @Biajuuu Před 2 měsíci +1

    Remember kids, pirating adobe product is always morally correct

  • @marufbepary100
    @marufbepary100 Před 3 měsíci +5

    The thing is that unlike the old days, you do not own anything but rather own the license to use it. So if the product is discontinued you can't use. So running cracked software is like stealing a license and not the product itself.

  • @iAmTaki
    @iAmTaki Před měsícem

    I already knew what this video explains but it was still fun to watch. Your explanation was pretty good! Nice work!

  • @SquidSnipes
    @SquidSnipes Před 3 měsíci +2

    Καλησπέρα! Πολύ ωραίο βίντεο φίλε συνέχισε έτσι!

  • @EmmanuelNgulube-i5f
    @EmmanuelNgulube-i5f Před měsícem

    Pov : When you realise the cpu is a tablet of crystals.

  • @0Abdo
    @0Abdo Před 3 měsíci +5

    great video underrated channel could you talk about online cracking next ?

  • @knodesec
    @knodesec Před 3 měsíci

    Malware analysts also utilize some of the cracking techniques, when malware is packed or obfuscated. But legitimately since they're dealing with malicious software and it's their job to do so.

  • @thenasiudk1337
    @thenasiudk1337 Před 3 měsíci

    In my country, people find it weird that you actually need to pay for software, even in IT enthusiast circle, there's really no law against software piracy here. If there ary any exist, they are not enforced properly

    • @cristianandrei5462
      @cristianandrei5462 Před 20 dny

      How do you enforce it? You can't go to everyone and search their computer for pirated software, music etc. Everyone will have something pirated let's be honest...

  • @Free.Education786
    @Free.Education786 Před 3 měsíci +1

    Excellent 👍♥️🔥👌. Please start advance website hacking penetration exploitation bug hunting series on live targets. Thanks

  • @sanaullahraisofficial
    @sanaullahraisofficial Před 2 měsíci

    If you're running a business and using cracked software, it'll hold you back. Investing in legitimate software shows respect and helps you work better, just like how buying a good book with beautiful pages makes reading more enjoyable and worthwhile.

  • @pedrosilveira6554
    @pedrosilveira6554 Před 3 měsíci +1

    When you steal, you get a stuff and the other person loses it.
    When you crack something, you get this stuff and no-one loses anything

    • @jordanwardle11
      @jordanwardle11 Před 3 měsíci

      Except the compensation from making something of value. Something that you also find value in

    • @CLANIMEProductions
      @CLANIMEProductions Před 2 měsíci

      ​@jordanwardle11 There is no loss to the companies. It's not a loss of a sale like you might think. It's is usually company greed that leads to piracy. If Photoshop allowed you to purchase a license permanently, I can guarantee piracy rates of Photoshop would fall.

    • @jordanwardle11
      @jordanwardle11 Před 2 měsíci

      @@CLANIMEProductions would it? Is the MAIN reason to pirate adobe software is that it doesn't have an ownership licence? You would be WILLING to pay $700 as an individual to get permanent software?

    • @StudentMostofaSharthok
      @StudentMostofaSharthok Před 2 měsíci +2

      meh, let the mega-cooperations cry about it

    • @rohitchaoji
      @rohitchaoji Před 2 měsíci

      ​@@jordanwardle11Someone pirating a software wasn't going to buy it in the first place, so no, there's no sale lost or loss of compensation that they'd otherwise get, because they'd not have gotten it in the first place.

  • @iulian_98
    @iulian_98 Před 2 měsíci

    The last part is just for the youtube algorithm that checks the content. CZcams has deleted and continues to delete videos that teach such things.

  • @Vexcenot
    @Vexcenot Před 3 měsíci +2

    pirated software is always faster and much lighter than the full thing you have to waste hundreds on

  • @garadosix25
    @garadosix25 Před 3 měsíci +1

    Remember guys, its always morally correct to crack adobe products.

  • @ericmarin5406
    @ericmarin5406 Před 3 měsíci +2

    Cool video, also the editing is insane

  • @coding_hobbyist19
    @coding_hobbyist19 Před 3 měsíci

    Great video. Also you could have included that some developers make it even harder to crack their software by implementing sophisticated piracy checks that can discover that some part of code has been adjusted/left out as the result of trying to bypass the authentication.

  • @bosswhopper
    @bosswhopper Před 2 měsíci

    bro sounds like kashmiri indians
    also, great explanation bro thanks

  • @ArcamNight
    @ArcamNight Před 3 měsíci +1

    cracking an offline program is pretty easy with a debugger, with the online checks things are getting complicated

  • @ahq_founder
    @ahq_founder Před 3 měsíci +4

    If I'm right, C# doesn't compile directly into assembly, same for java, java needs JVM

    • @IrrationalExuberance
      @IrrationalExuberance Před 2 měsíci

      Java is compiled to byte code for a stack machine architecture, but the stack machine is a virtual machine (JVM) rather than a class of actually existing physical processors. The physical machines we use are what is known as a register machine architecture.
      Assembly is a text-based mnemonic representation of machine code numeric instructions, so you can actually represent a program for a given architecture numerous ways. x86-64 / x86 for example have two main assembly languages for them: the so-called "Intel syntax" and "AT&T syntax"
      On Android, my understanding is they actually do sometimes do ahead-of-time compilation to native machine code and then embed this into a container executable format, and you can also have what is known as JIT (I think the traditional PC java run-times also feature JIT, but I have to warn you that I have not much experience with traditional desktop Java), which is where byte code that is for the virtual stack machine has certain "critical sections" compiled at runtime into the physical processors register machine code as it is needed (stands for Just In Time compilation)
      So in short, you should not consider assembly machine code, it's actually another plain text programming language.
      Also search for and read about "ABI"s and "calling conventions" if you are curious about how C-based APIs can be utilized through machine code (and therefore assembly languages)

  • @brandon2173
    @brandon2173 Před 2 měsíci

    While cracking adobe products is not legal, it is always morally correct. Remember that.

  • @aopen130
    @aopen130 Před 3 měsíci

    No idea why this was recommended to me. The video itself is very informative. Looking forward to your next upload.

  • @gjermundification
    @gjermundification Před 2 měsíci

    2:35 Or if 1 == 1, opposed to givenKey == correctKey, or one could set givenKey = 0x01 and correctKey = 0x01, that way one would not have to do any guessing. Well, then again I did not practice such stuff since Commodore 64, the swopping of BNE vs BEQ could give other issues.

  • @kwanele_dev
    @kwanele_dev Před 2 měsíci

    lmao my man had to put the discalimer at the end just so they don't come for him 😭😭

  • @_memetastic_
    @_memetastic_ Před 3 měsíci +1

    You gained a subscriber brother
    Keep it up! 🔥

  • @KelfranGt
    @KelfranGt Před 3 měsíci +1

    Can't believe I got rickrolled from a video about crack software

  • @simon199418
    @simon199418 Před 2 měsíci

    Ideal topic to be explained by a Greek guy.

  • @robertvalenica8999
    @robertvalenica8999 Před 3 měsíci

    If owning isn’t owning, than pirating isn’t pirating.

  • @therealhussein
    @therealhussein Před 3 měsíci

    If buying a software isn't owning it
    Then pirating it isn't stealing

  • @computerzero2681
    @computerzero2681 Před 2 měsíci

    'What a time to be alive' ah voice

  • @icyjaam
    @icyjaam Před 3 měsíci +3

    Piracy is the best thing ever

  • @al-gv7mq
    @al-gv7mq Před 3 měsíci

    *Java isn't compiled into assembly, but java bytecode which can usually be readable from a jar file ^3^

  • @Xeta_
    @Xeta_ Před 3 měsíci

    My digital logic and computer organization classes coming in clutch

  • @dimitris70080
    @dimitris70080 Před 3 měsíci +2

    Nomizw o monos ellinas me tetoio content, keep up the good work!

  • @grubbsgaben4461
    @grubbsgaben4461 Před 3 měsíci +1

    I'm pretty sure you watched your video a lot of times before uploading it. You should have watched it one last time, to fix typo (if it wasn't intentional) and the overlaps of animations/flashes of images before the animation goes live. Cool video tho, cheers

  • @themissinfowar6629
    @themissinfowar6629 Před 3 měsíci

    You can sometimes reset the software if it has a trial period by finding where it saves how long you’ve been using it for in the filesystem. I still use Photoshop CS6 this way. I don’t need anything newer so its still fine for me

  • @heyitsmejm4792
    @heyitsmejm4792 Před 3 měsíci

    in this case with ADOBE, they could make it impossible to crack, but they chose not to because they don't want anyone who is starting with multimedia software to use a different software and avoid adobe completely. they want them to learn their software (even illegally, but of course they wouldn't say that for formality's sake) to keep them in the adobe ecosystem. if they learn and become professional and decides to buy the software then Great, but if they don't, its also good since majority of adobe's money comes from big ass corporations that use their software in bulk anyways. so it don't really matter to them that much. and besides, that's what made adobe very famous.

  • @NikolaZagorac
    @NikolaZagorac Před 3 měsíci

    You got it wrong, machine code is a readable set of commands a CPU has built-in in it's structure, and also addresses and values. You are talking about binary which are the electrical signals which represent bites. In case of C#, it is first compiled into .NET CIL (common intermediate language) which is then translated to machine code which is sent in binary to the CPU.

  • @Mr.RedRhino
    @Mr.RedRhino Před 3 měsíci

    2:03 Congrats you made a kitchen 😉

  • @LlamaBG
    @LlamaBG Před 2 měsíci

    that key seems awfully familiar...

  • @DK-ox7ze
    @DK-ox7ze Před 3 měsíci

    If this is so easy to reverse engineer these complex software applications then it should be almost as easy to hijack any software in the world.

  • @mohaismad
    @mohaismad Před 2 měsíci

    Things would have been much simpler if companies still did the one time purchase of a product like in old times. Yes the subscription model is more profitable but so is Piracy profitable for the end user.
    If it was a simple process of "hey pay X dollars, take this USB drive/CD with your software and you own it forever", people would have been more likely to legitimately buy software instead of pirating (ofc there would still be piracy because no one is beating broke college students lol)

  • @supermanbanty3210
    @supermanbanty3210 Před 2 měsíci

    Please make some videos regarding NTA scam . May your voice bring justice to NEET students

  • @Gnomur
    @Gnomur Před 3 měsíci +1

    You deserve more attention man

  • @megaabytes2
    @megaabytes2 Před 3 měsíci

    Great video, but you forgot to mention that sometimes keys are generated and verified by using asymmetric cryptographic algorithms (Ecdsa, schnorr, dsa). In that scenario keygens arent feasible to create, even if its verified offline.

  • @affandih
    @affandih Před 2 měsíci

    Back then I remember a keygen from X-Force 😂 for Autodesk, Zii for Adove 😂

  • @nikunjkhangwal
    @nikunjkhangwal Před 3 měsíci

    Keep making these type of videos. You have huge potential

  • @malcoder
    @malcoder Před 3 měsíci +1

    upload more content like this i guarantee you within 1 month you'll reach 10k

  • @SalmanM190
    @SalmanM190 Před 3 měsíci

    Piracy will live on as long as companies don’t appeal to the customer. Imagine paying for software you don’t own or have control over.
    Imagine paying for a car that isnt yours and cant drive as fast as you want 🗿

  • @omercelebi2012
    @omercelebi2012 Před 3 měsíci +1

    Program is an algorithm.
    Algortihm is an idea.
    Idea is an effort.
    Effort needs an energy.
    Energy is a life.
    If you using cracked software you are stealing from someones life.

    • @CaveTheJohnsonOfApurture
      @CaveTheJohnsonOfApurture Před 3 měsíci

      1. A program is not an algorithm
      2. Large companies deserve it anyway. Unfortunately the easiest programs to crack are made by smaller studios/solo devs.

  • @emiel333
    @emiel333 Před 3 měsíci +1

    Great explanation. I’ve subscribed.

  • @spawel1
    @spawel1 Před měsícem

    back in the day we'd just slap the box a few times usually worked

  • @Clock_Man_2763
    @Clock_Man_2763 Před 3 měsíci

    WE GETTING RICKROLLED WITH THIS ONE 🔥🔥

  • @_North
    @_North Před 3 měsíci

    I fell asleep to this last night

  • @speechlesswolf127
    @speechlesswolf127 Před 2 měsíci

    Πολλα μπραβο εχω να σου πω φίλε και χαιρομαι να βλεπω ελληνες πανω σε τετοια θέματα. Είμαστε λίγοι νομιζω ;)

  • @Isaiah-iu6rx
    @Isaiah-iu6rx Před 3 měsíci +1

    I would like if you did a video doing crackmes to showcase how they work in practice rather than just theory! Great video though, very informative!

  • @charismafunds
    @charismafunds Před 3 měsíci

    I never used any genuine software in my life yet. All cracked 😅

  • @seasn5553
    @seasn5553 Před 3 měsíci

    Why you said CRAXKERS I laughed so hard 😂😂😂

  • @someoneunknown6894
    @someoneunknown6894 Před 3 měsíci

    Wow, great video! I wasn't expecting to see only 444 subs. 445 now :)

  • @alexalekos
    @alexalekos Před 2 měsíci

    nice and informative vid
    ps. I've never heard before a greek speak english like an indian 😅

  • @redcoat4348
    @redcoat4348 Před 27 dny +1

    By the way, the youtube channel CyberFlow seems to have copied your video and remade it with AI. You might want to file a copyright strike on him.

  • @tenix6698
    @tenix6698 Před 3 měsíci +2

    what about overcoming online verification?

  • @somerandomfinn668
    @somerandomfinn668 Před 3 měsíci +1

    is it bad I immediately recognized the Rick-roll video ID?

  • @Jodela-em1qg
    @Jodela-em1qg Před 3 měsíci

    Oh yes, the java compiler of the compiled language java

  • @UncleChrisTs
    @UncleChrisTs Před 3 měsíci +1

    What do you study mate ? Great Video !

  • @TAHyron
    @TAHyron Před 3 měsíci

    2:01 rick roll url spotted

  • @bowlingguy7755
    @bowlingguy7755 Před 3 měsíci

    Reminds me of the "good old days" of Softice and w32dasm...

  • @asaugh
    @asaugh Před 3 měsíci +1

    remember me dude i love these

  • @mythgamerr
    @mythgamerr Před měsícem

    Interesting (I'm not a computer science student)

  • @LiamOfOzz
    @LiamOfOzz Před 3 měsíci

    congrats on 1k subscribers :)

  • @human2713
    @human2713 Před 3 měsíci +1

    the key is rickroll url , idont know how i just got that💀

  • @il_piruz
    @il_piruz Před 3 měsíci

    i like how almost everyone understood what the key is really

  • @chrismolina2145
    @chrismolina2145 Před 2 měsíci

    Stop telling ma man here things about morals and ethics regarding Piracy, he added that last statment so maybe his video isn't taken down