Another version
Increase the invalid code
Command : TT
then Point two points
Part of the code:
.............. (CdLbUiHq99)(GxBqQd38)(LtNpWm59)(JiOuTx51)(VkGnXaBsXk90)(LbOoIt61)(GsOtVo76)(RqXyXwMr92)(QtEmEtPg17)(VcAuFp96)(IbLbPnBe62)(PjQeLkWlBv46)(ShXyXiCw40)(ScTuAkMp82)(VbNoErXp65)(LrYmMsMdIj52)(XxXkFbXjKe29)(YnJqGf15)(YmNaJqVs33)(AyVvBhQfAk37)(CrJvUg77)(RkKrBvOy19)(MxMlKdHcSr43)(NrLqEiBpIw43)(FdFbXbPpFq68)(McUgVg77)(UcNuSrUs90)(NkTnQqJc35)(XqEeAaUjLr73)(DpLqLtSqJs17)(NsBqUkMdBs66)(VdJxWuYi42)(JrTiLiPu46)(UlBcEg25)(YrTdYsRnQj14)(NdMmDdPx56)(OlBnHa31)(SpBhEdGdWp5)(WyKsWo84)(XjDqRy71)(LmEtDxTiOm57)(FtNwVbYp79)(JrArEaYj15)(EmPaOiMpNi86)(SmMlSsCa33)(DyNaRiNcTm15)(PwFhPv77)(BuPiJpEy70)(QvMqEh53)(NrYrYfBtGl59)(XjAdBvNbUu68)(WjWmNoOb17)(FdIbUvUgTm66)(QqDnKqIiXg30)(SgHvTaNrUp91)(UmAgPkPn88)(CxKeJoKp92)(KtDgBcVdHv34)(YwCaMlMxPj9)(WjOmYwYs35)(QsGoGpXrGp20)(EaUkWyTd20)(IbQdOlOfWd59)(HrWpGwIh36)(JuYbMr23)(PrCyEo7)(XsNnNdDt92)(OgGtJuWyKd94)(WvNgPx86)(JhEvQtEcPc50)(JnPbFgWy53)(XcRkBeGs35)(KfLcPqDgRx78)(YmDfRx51)(RvBxNcJa47)(HxBlXa86)(DrHoXpVyKg77)(WrJaBm31)(QgPvIt29)(TdTlTlFg9)(KrEfIa21))
I'm sorry, but this is a very weak defense.
Such protection is much weaker than the vlx and can be broken without the knowledge of AutoCAD any programmer. I think I'll be able to remove this protection in the five lines of Lisp...
For protection, I recommend using the unique capabilities AutoCAD.
Using standard and predictable data that is generated in the program will use them as keys for decryption. for example, can be geometrically tangent or other data that are further used in the program. To break such a program would be necessary to examine her work in AutoCAD. This will require a hacker to find a unique knowledge of the designer...