Solved

Program Overlay access/encryption and security

Posted on 2009-05-20
6
247 Views
Last Modified: 2012-05-07
I have an EXE that is actually SWF player with overlay containing the SWF with "treasure" data inside. Is there any solution to protect this overlay part of code? All protectors so far focus only on actual EXE code but after heavy protection they just append unprotected Overlay at the end.

Is there any working code for doing this? Some secured access. Preferrably in Delphi.

Could somebody advise what is the best solution for this, or share some links for books/articles dealing with the topic.  
0
Comment
Question by:Arnie007
  • 2
  • 2
6 Comments
 
LVL 23

Accepted Solution

by:
Admin3k earned 500 total points
ID: 24435528
I am not exactly sure I understand you fully ,but a couple of years ago ,using something like telock , would have made reverse engineering an executable really difficult, should play nice with Delphi.


0
 

Author Comment

by:Arnie007
ID: 24435987
The problem with all those protectors (like telock) is that they protect only main exe and just append the overlay unprotected. Thus I want some advice how to manage/secure access to file overlay (probably I would first encrypt it).
0
 
LVL 1

Expert Comment

by:KillerCode
ID: 24448387
u can encrypt the whole exe (with its resources and overlay data or whatever) and put it in another exe which will decrypt it in memory during runtime and run it from memory without writing to disk, so they wont be able to reach it
0
 

Author Comment

by:Arnie007
ID: 24448772
@KillerCode: Is there any simple/cheap EXE2EXE compressor you mentioned in your post?
0
 
LVL 1

Expert Comment

by:KillerCode
ID: 24449906
i guess so if EXE2EXE means encrypting an exe and putting it in the resources of the other then yet
but u will add encryption to it (RC4/AES/DES)
0

Featured Post

Give your grad a cloud of their own!

With up to 8TB of storage, give your favorite graduate their own personal cloud to centralize all their photos, videos and music in one safe place. They can save, sync and share all their stuff, and automatic photo backup helps free up space on their smartphone and tablet.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Article by: btan
Provide an easy one stop to quickly get the relevant information on common asked question on Ransomware in Expert Exchange.
These days, all we hear about hacktivists took down so and so websites and retrieved thousands of user’s data. One of the techniques to get unauthorized access to database is by performing SQL injection. This article is quite lengthy which gives bas…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now