Program Overlay access/encryption and security

Posted on 2009-05-20
Last Modified: 2012-05-07
I have an EXE that is actually SWF player with overlay containing the SWF with "treasure" data inside. Is there any solution to protect this overlay part of code? All protectors so far focus only on actual EXE code but after heavy protection they just append unprotected Overlay at the end.

Is there any working code for doing this? Some secured access. Preferrably in Delphi.

Could somebody advise what is the best solution for this, or share some links for books/articles dealing with the topic.  
Question by:Arnie007
  • 2
  • 2
LVL 23

Accepted Solution

Admin3k earned 500 total points
ID: 24435528
I am not exactly sure I understand you fully ,but a couple of years ago ,using something like telock , would have made reverse engineering an executable really difficult, should play nice with Delphi.


Author Comment

ID: 24435987
The problem with all those protectors (like telock) is that they protect only main exe and just append the overlay unprotected. Thus I want some advice how to manage/secure access to file overlay (probably I would first encrypt it).

Expert Comment

ID: 24448387
u can encrypt the whole exe (with its resources and overlay data or whatever) and put it in another exe which will decrypt it in memory during runtime and run it from memory without writing to disk, so they wont be able to reach it

Author Comment

ID: 24448772
@KillerCode: Is there any simple/cheap EXE2EXE compressor you mentioned in your post?

Expert Comment

ID: 24449906
i guess so if EXE2EXE means encrypting an exe and putting it in the resources of the other then yet
but u will add encryption to it (RC4/AES/DES)

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Guide on using PGP email encryption 4 50
Video enhancement recommendation 7 77
TrapX & best honey pots that deal with email ransomwares & malwares 1 45
Ransomware is a growing menace to anyone using a computer or mobile device. Here are answers to some common questions about this vicious new form of malware.
Many old projects have bad code, but the budget doesn't exist to rewrite the codebase. You can update this code to be safer by introducing contemporary input validation, sanitation, and safer database queries.
Sending a Secure fax is easy with eFax Corporate ( First, Just open a new email message.  In the To field, type your recipient's fax number You can even send a secure international fax — just include t…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

685 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question