Solved

CRC

Posted on 2001-07-27
5
308 Views
Last Modified: 2010-04-06
Ok  Experts??????

Show me your Work On This Littel Thing

I Got some Demo Source From Gwena Site Thanks To Her

But Now Iam Wondering if we can come up with something

To Protect A Single File From Being Copied From It's Original location Say On Floppy Disk Based On The CRC Technolegy

What i mean is :

With CRC  I Can Get  For EXAMPLE

Test.Exe

CRC16 = 19439
CRC32 = 1462223268
CRCArc = 14969

This is The Reading for my TEST.EXE File.

Now Iam Trying to Get My File To Change these Readings
When Ever SomeOne Moves It From It's Original location  to a new location on Hdd Or to CD Or To another Floppy Disk Or To LAN Or What Ever. How It Will Modify It Self Based On Gwena Source.

Now I Tried To Get My File To Know When Its Been Copied Or Moved Or Cut And Pased and i will tell him to add Short String To It Self So it Will Change The Size and then the CRC Readings Will Be Changed  And The Program Will Not Work.

Any Body Have Any Idea Let's See It. Thanks All





0
Comment
Question by:zaferms
5 Comments
 
LVL 1

Expert Comment

by:umulig
ID: 6328247
0
 
LVL 21

Expert Comment

by:gemarti
ID: 6328362
Listening
0
 
LVL 20

Expert Comment

by:Madshi
ID: 6329376
You want a file hook, that fires before the file is touched? Then you have to write a vxd driver (or equivalent in NT based systems). Or use an existing vxd. *Very* hard stuff...

Regards, Madshi.
0
 
LVL 26

Expert Comment

by:Russell Libby
ID: 8734909
No comment has been added lately, so it's time to clean up this TA.
I will leave a recommendation in the Cleanup topic area that this question is:

To be PAQ/Refund

Please leave any comments here within the next seven days.
 
PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER!
 
Thank you,
Russell

EE Cleanup Volunteer
0
 

Accepted Solution

by:
RotaredoM earned 0 total points
ID: 8822592
zaferms abandoned the question..

Question PAQed and 100 points removed.

RotaredoM
CS Mod @ EE
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Objective: - This article will help user in how to convert their numeric value become words. How to use 1. You can copy this code in your Unit as function 2. than you can perform your function by type this code The Code   (CODE) The Im…
Hello everybody This Article will show you how to validate number with TEdit control, What's the TEdit control? TEdit is a standard Windows edit control on a form, it allows to user to write, read and copy/paste single line of text. Usua…
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
Along with being a a promotional video for my three-day Annielytics Dashboard Seminor, this Micro Tutorial is an intro to Google Analytics API data.

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now