Some of these individuals can (and will) to analyze your scripts without your permission in their personal or commercial purposes, or copy part or all of the source code as a whole, to find vulnerabilities in the structure of your site, as well as in the other, contrary to your interests, purposes.
It should be remembered that this analysis is carried out not only manually, but often in the automatic mode 24 hours per day. Less than open source code of your scripts, the more chances to avoid the risk of unauthorized use and the occurrence of damage to you.
Remedies source scripts usually divided into cryptors and Obfuscators .
obfuscator irreversibly change themselves design the script source code. Added between operators source "junk" instructions replace readable names and logical functions, constants and variables with meaningless in terms of human names.
For example: if (BrowserName == "IE") SendRequest(1);
transform into if (Е2А==eSx)Pl1(iF0);
Cryptor create more compact code and less impact on the performance of the original script, but less resistant to deprotection and after the "failure" give all the source code for almost the initial state.
Obfuscators, to achieve the same unreadable significantly increase in the amount of code and some cases adversely affect the reliability of the original script. But while protecting quality obfuscator can not be removed until the end, even after a detailed analysis of its mechanism.
Cryptor / obfuscator Caesar combines the pluses of both approaches. Mechanism allows the use of encryption reduce the inevitable increase in code size of the output. Obfustsirovanie important sections of code decompressor, and delicate obfustsirovanie source resistance increases protection.
/16.12.2018/ Уважаемые покупатели! Оплата через карты и ЯД временно не работает (смена реквизитов).
/08.03.2018/ Плановые обновления обфускаторов caesar и caesar+