Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

CRC

Posted on 2001-07-27
5
Medium Priority
?
317 Views
Last Modified: 2010-04-06
Ok  Experts??????

Show me your Work On This Littel Thing

I Got some Demo Source From Gwena Site Thanks To Her

But Now Iam Wondering if we can come up with something

To Protect A Single File From Being Copied From It's Original location Say On Floppy Disk Based On The CRC Technolegy

What i mean is :

With CRC  I Can Get  For EXAMPLE

Test.Exe

CRC16 = 19439
CRC32 = 1462223268
CRCArc = 14969

This is The Reading for my TEST.EXE File.

Now Iam Trying to Get My File To Change these Readings
When Ever SomeOne Moves It From It's Original location  to a new location on Hdd Or to CD Or To another Floppy Disk Or To LAN Or What Ever. How It Will Modify It Self Based On Gwena Source.

Now I Tried To Get My File To Know When Its Been Copied Or Moved Or Cut And Pased and i will tell him to add Short String To It Self So it Will Change The Size and then the CRC Readings Will Be Changed  And The Program Will Not Work.

Any Body Have Any Idea Let's See It. Thanks All





0
Comment
Question by:zaferms
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 1

Expert Comment

by:umulig
ID: 6328247
0
 
LVL 21

Expert Comment

by:gemarti
ID: 6328362
Listening
0
 
LVL 20

Expert Comment

by:Madshi
ID: 6329376
You want a file hook, that fires before the file is touched? Then you have to write a vxd driver (or equivalent in NT based systems). Or use an existing vxd. *Very* hard stuff...

Regards, Madshi.
0
 
LVL 26

Expert Comment

by:Russell Libby
ID: 8734909
No comment has been added lately, so it's time to clean up this TA.
I will leave a recommendation in the Cleanup topic area that this question is:

To be PAQ/Refund

Please leave any comments here within the next seven days.
 
PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER!
 
Thank you,
Russell

EE Cleanup Volunteer
0
 

Accepted Solution

by:
RotaredoM earned 0 total points
ID: 8822592
zaferms abandoned the question..

Question PAQed and 100 points removed.

RotaredoM
CS Mod @ EE
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The uses clause is one of those things that just tends to grow and grow. Most of the time this is in the main form, as it's from this form that all others are called. If you have a big application (including many forms), the uses clause in the in…
In my programming career I have only very rarely run into situations where operator overloading would be of any use in my work.  Normally those situations involved math with either overly large numbers (hundreds of thousands of digits or accuracy re…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

715 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question