Solved

Non Volatile Check  Not registry

Posted on 2009-05-14
4
182 Views
Last Modified: 2012-05-07
Hello,

I have a program that when installs sets a value in the registry.  When the program starts it checks this registry value to determine how many times the program has been run.  If its the first time then form1 will run, if not then form2 will run.

This works fine, however the security of the application could be compromised if someone manually changed the registry value to trick the program into believing that its the first run even though it might not be.
Im trying to think of mechanism that I could use to prevent / detect this?

Any suggestions most appreciated.

Thanks.
0
Comment
Question by:andyw27
  • 3
4 Comments
 
LVL 22

Accepted Solution

by:
cookre earned 500 total points
ID: 24389398
Encrypting the Registry values will get you a little more security.

But you'll still have problems with those who track changes across installs.

0
 

Author Comment

by:andyw27
ID: 24389439
I guess I could hash the value using MD5?
0
 
LVL 22

Expert Comment

by:cookre
ID: 24389445
Of course, you could always have the install require a web connection to your own site wherein you save install info.
0
 
LVL 22

Expert Comment

by:cookre
ID: 24390897
MD5 would be fine.
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Keyboard 2 40
Hey!! 5 36
Printing 1 57
need to convert function to c# 5 23
Introduction Hi all and welcome to my first article on Experts Exchange. A while ago, someone asked me if i could do some tutorials on object oriented programming. I decided to do them on C#. Now you may ask me, why's that? Well, one of the re…
This article aims to explain the working of CircularLogArchiver. This tool was designed to solve the buildup of log file in cases where systems do not support circular logging or where circular logging is not enabled
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…

791 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question