Solved

Protect process in delphi

Posted on 2011-03-04
7
945 Views
Last Modified: 2012-05-11
Hello experts.
Please help me with one thing.

i need to make a app that automaticaly encrypts,protects self process.
To understand me program be protected from Process Terminate, WriteProcessMemory or other.

But the principial is Process Terminate.
I know a method, but this requires a file (protectdriver.sys) who is localized as a rootkit.

Anybody help me to write this program.
Thanks.
0
Comment
Question by:helyonprime96
  • 4
  • 3
7 Comments
 
LVL 37

Accepted Solution

by:
Geert Gruwez earned 500 total points
ID: 35035037
run your program (created as a service) with an adminstrator user
only allow this user to start/stop the app

doing it from code is not possible
and tends to be looked at as a virus program

in the end,
you can kill any application by just pulling out the electric cord ...
0
 

Author Comment

by:helyonprime96
ID: 35035077
and thats all?
0
 
LVL 37

Expert Comment

by:Geert Gruwez
ID: 35035082
yes, this assumes within a company that you are a network admin
or the network admin is willing to do that for you ...

0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 

Author Comment

by:helyonprime96
ID: 35035118
ok thanks
0
 

Author Closing Comment

by:helyonprime96
ID: 35035121
youre master
0
 

Author Comment

by:helyonprime96
ID: 35035122
for what is used functions VirualAlloc and Virtual Protect?
0
 
LVL 37

Expert Comment

by:Geert Gruwez
ID: 35035512
VirtualAlloc:
http://msdn.microsoft.com/en-us/library/aa366887%28v=vs.85%29.aspx
in short reserving some memory in your app's virtual memory address space

VirtualProtect
http://msdn.microsoft.com/en-us/library/aa366898%28v=vs.85%29.aspx
for changing the protection on that memory area:
read/write/etc

0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This is an explanation of a simple data model to help parse a JSON feed
Whether you've completed a degree in computer sciences or you're a self-taught programmer, writing your first lines of code in the real world is always a challenge. Here are some of the most common pitfalls for new programmers.
An introduction to basic programming syntax in Java by creating a simple program. Viewers can follow the tutorial as they create their first class in Java. Definitions and explanations about each element are given to help prepare viewers for future …
With the power of JIRA, there's an unlimited number of ways you can customize it, use it and benefit from it. With that in mind, there's bound to be things that I wasn't able to cover in this course. With this summary we'll look at some places to go…

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now