Encryption password in program, to secure its centrally-stored settings?

I was thinking of implementing this in software, starting with one password, with each new release being derived from that initial password.
(trying to find the name of this technique, I think it’s called a “hash chain”)
That way you can g… Continue reading Encryption password in program, to secure its centrally-stored settings?

What can I do to make it as hard/expensive as possible for a hacker if I’ve detected a malicious DDOS request?

I want to implement some sort of an Under Attack Mode for our application.
Of course I could use CloudFlare or any other solutions, but let’s say for the sake of a programming exercise I detect a malicious request – i.e. because they don’t… Continue reading What can I do to make it as hard/expensive as possible for a hacker if I’ve detected a malicious DDOS request?

Is it possible that Anti-Cybercrime Police catch and track DDOS black service buyer? [closed]

Is it possible that Anti-Cybercrime Police catch and track DDOS black service buyer?
My IP is being attacked for years (DDOS) from IPs and IP ranges from hundreds of different IPs.
The story is:
I have a neighbor, he is an IT professional…. Continue reading Is it possible that Anti-Cybercrime Police catch and track DDOS black service buyer? [closed]

Is it possible to send data from an open-source program but make it impossible for a user with source code to do the same?

If I want to store a global scoreboard for a game running locally on the user’s computer and I want to make sure that all the requests coming to the server are really generated by the game and not spoofed by the users, is there anything th… Continue reading Is it possible to send data from an open-source program but make it impossible for a user with source code to do the same?