473,657 Members | 2,556 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Avi file protection

I have some private wmv and avi files. I would like to protect these files
programmaticall y.

One idea is to make some player with c# and use these files only with this
player.

Do you have some ideas how I can do that?

Can you point me to specific information? If possible, real code samples.

Thanks in advance :)
Nov 17 '05 #1
1 2908
One idea is that you could write a utility to box and unbox an arbitrary
file. I mean, take an AVI file, and save it into a BIN file (where by BIN, I
mean any file extension you have associated with your utility program). Your
program could write additional information into your BIN file that tells
about the original file's name and extension.

When double clicking on one of your BIN files, your utility could extract
the AVI (it really works with any original file), decrypt it into a temporary
file location, use Shell Execute to launch the associated program (e.g.
Windows Media Player), wait for that process to finish, and then delete the
temporary file.

That would allow you to protect any file. From the perspective of
double-clicking your BIN file, it looks like it's opened directly into
whatever program regularly services the original file. Although, if you edit
and save, it's not going to modify your BIN because it's really processing
from a temporary location. However because your utility waits for the
termination of the ShellExecute, your utility could look for changes in the
temporary file and then automatically update your BIN file.

For any additional help, or to have this product created for you, please
mail half of the $10000 payment in advance.

"Washington " wrote:
I have some private wmv and avi files. I would like to protect these files
programmaticall y.

One idea is to make some player with c# and use these files only with this
player.

Do you have some ideas how I can do that?

Can you point me to specific information? If possible, real code samples.

Thanks in advance :)

Nov 17 '05 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

5
5451
by: Dave Smithz | last post by:
Hi There, I have a PHP script that sends an email with attachment and works great when provided the path to the file to send. However this file needs to be on the same server as the script. I want to develop a webpage where people can send attachments that are stored on their local PC.
1
2322
by: Naeem Sarfraz | last post by:
I understand this file is under protection but how do I remove it from the 'detected dependencies' in the Installer project. The error message: 'shdocvw.dll' should be excluded because its source file 'C:\WINDOWS\System32\shdocvw.dll' is under Windows System File Protection.
9
2355
by: Howard | last post by:
I am currently looking at the various packages that are available for software protection. I have a particular question that I'd welcome your feedback on. Background info: I work for a company that develops software, and typically releases software SDKs. Development is in C++ using MS Visual C++. We need to apply software encryption/protection to achieve: 1) Time-limited versions (e.g software expires after X days)
0
2020
by: SoftComplete Development | last post by:
SoftComplete Development Updates EXECryptor to v. 2.1.20 Software piracy! Cracked serial numbers! Thousands of commercial products are posted on the warez sites and become available to all who want have your software product and pay no money for your development work! Shareware developpers look for good protection for their products and create some protection themselves or find ready-made tools. But there's no many programs really...
3
1826
by: Bill | last post by:
Using ASP in a VBScript environment, how can I check the protection on a directory, or a particular file?
2
16620
by: Maziar Aflatoun | last post by:
Hi, I'm trying to protect one of my subfolders from Web.config file in my root folder. Here is my directory structure / // My shopping cart /admin // Shopping cart admin which needs to be protected Now in my Web.config how can I protect just the /admin folder (which is not a virtual directory) it's simply a folder in my / folder?
1
1292
by: Malik Asif Joyia | last post by:
Hello I want to implement the forms based authentication. for a sub directory in my webapplication. I have allready applied Forms based authentication in my webapplication ,, I have added a folder in my webapplication for the admin side of the webside and want to implement forms based authentication. so that admin users can be checked for security. i added a web.config file. but when i add the code below <authorization> <deny...
1
1280
by: Rotsen | last post by:
HI people, I am trying to read a file using "file" and I am passing the following string for the input file parameter: http://maggie.sdcwa.org/eng/list/client_find_project_list.phtml?proj_name=CATHODIC PROTECTION OF RAMONA PIPELINE PHASE 2&show=1 phpinfo shows: _GET CATHODIC
13
2396
by: NickName | last post by:
"For the vision impaired, SVG offers tremendous potential for interactive Internet mapping applications as discussed by Gardner and Bulatov (2001).". Now, here's an SVG file with fair/medium complexity, http://www.carto.net/papers/svg/samples/canvas.svg, even as a sighted person, I find its source code albeit in xml format hard to "absorb" at the first glance, let alone a visually impaired individual. The most important element seems...
0
1860
by: dba | last post by:
Hi folks, I would just like to share with you SQL CodeSecure, a newly released database protection and auditing tool from SqlLabs: SQL CodeSecure provides ultimate protection from unauthorized creation, modification and deletion of database objects. It provides flexibility through various protection types and granularity at different protection levels. CodeSecure comes with a full-featured auditing tool that keeps track of all changes...
0
8397
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
8827
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
1
8503
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
8605
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
7333
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
6167
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
5632
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
4158
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
1
2731
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.