Solved

Protect process in delphi

Posted on 2011-03-04
7
959 Views
Last Modified: 2012-05-11
Hello experts.
Please help me with one thing.

i need to make a app that automaticaly encrypts,protects self process.
To understand me program be protected from Process Terminate, WriteProcessMemory or other.

But the principial is Process Terminate.
I know a method, but this requires a file (protectdriver.sys) who is localized as a rootkit.

Anybody help me to write this program.
Thanks.
0
Comment
Question by:helyonprime96
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 3
7 Comments
 
LVL 37

Accepted Solution

by:
Geert Gruwez earned 500 total points
ID: 35035037
run your program (created as a service) with an adminstrator user
only allow this user to start/stop the app

doing it from code is not possible
and tends to be looked at as a virus program

in the end,
you can kill any application by just pulling out the electric cord ...
0
 

Author Comment

by:helyonprime96
ID: 35035077
and thats all?
0
 
LVL 37

Expert Comment

by:Geert Gruwez
ID: 35035082
yes, this assumes within a company that you are a network admin
or the network admin is willing to do that for you ...

0
Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 

Author Comment

by:helyonprime96
ID: 35035118
ok thanks
0
 

Author Closing Comment

by:helyonprime96
ID: 35035121
youre master
0
 

Author Comment

by:helyonprime96
ID: 35035122
for what is used functions VirualAlloc and Virtual Protect?
0
 
LVL 37

Expert Comment

by:Geert Gruwez
ID: 35035512
VirtualAlloc:
http://msdn.microsoft.com/en-us/library/aa366887%28v=vs.85%29.aspx
in short reserving some memory in your app's virtual memory address space

VirtualProtect
http://msdn.microsoft.com/en-us/library/aa366898%28v=vs.85%29.aspx
for changing the protection on that memory area:
read/write/etc

0

Featured Post

Transaction Monitoring Vs. Real User Monitoring

Synthetic Transaction Monitoring Vs. Real User Monitoring: When To Use Each Approach? In this article, we will discuss two major monitoring approaches: Synthetic Transaction and Real User Monitoring.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This is about my first experience with programming Arduino.
In this post we will learn how to connect and configure Android Device (Smartphone etc.) with Android Studio. After that we will run a simple Hello World Program.
In this fourth video of the Xpdf series, we discuss and demonstrate the PDFinfo utility, which retrieves the contents of a PDF's Info Dictionary, as well as some other information, including the page count. We show how to isolate the page count in a…
Starting up a Project

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question