The problem is quite difficult and i'm starting to think that it's
impossible
to accomplish..
Suppose you have C.exe. When you run C.exe, it must change his 0x4e's byte
into 0xff.. Of course, when doing so - exception is raised because file is
in use..
Is there a way to do this without problems? 4 2086
Asipu posted: The problem is quite difficult and i'm starting to think
that it's impossible to accomplish..
Suppose you have C.exe. When you run C.exe, it must
change his 0x4e's byte into 0xff.. Of course, when doing so - exception is
raised because file is in use..
Is there a way to do this without problems?
Assuming your platform is Windows:
It can't be done by the .exe file. Your options are:
A) Get you .exe file to open another .exe file, then close
itself, the other .exe file with edit the original. The
downside is that you won't be able to delete the second
..exe file.
B) Instead of using another .EXE file to edit the original,
write a batch file. The upside here is that a batch file
*can* delete itself.
-JKop
And the question is :
Why would you even want to do that ? except if you had bad things in mind...
> Why would you even want to do that ?
Well the answer is twofold.. First, understanding security (and possibly
overriding it), and making a program that has output data in his own
exe file thus bypassing the need of second file for data storage
(also registry, DB conn, EventLog, other file, ..anything..)..
I know that to majority it seems like a stupid and unnecessary way to
accomplish simple data transfer, but with understranding those
"unusual" hidden procedures, i gain more insight into the broad
spectrum of the problem.
> Assuming your platform is Windows: It can't be done by the .exe file. Your options are:
A) Get you .exe file to open another .exe file, then close itself, the other .exe file with edit the original. The downside is that you won't be able to delete the second .exe file.
B) Instead of using another .EXE file to edit the original, write a batch file. The upside here is that a batch file *can* delete itself.
On Linux you can even delete a running executable, thus this seems to
be windows. If you run a batch file that will delete itself, there's 2
ways of deleting it. Depending on Win9x /NT kernel. The exe could
write a copy of itself, change it, write a batch file, close itself
and run the batch file.
If you're planning on writing a virus that mutates, you'd better
reconsider writing it and code something that is useful to people.
There's a lot of viruses already, we don't need new ones. More,
writing viruses always indicates failure in social life.
-Gernot This thread has been closed and replies have been disabled. Please start a new discussion. Similar topics |
by: Jake |
last post by:
How can I force an image download with IE using ASP.net??
Here is the catch: the image I want to force a write with
is located on another web server. I can only reference the
image with a URL.
If the image is on my machine, I use the
response.wrifefile method. After setting up my headers I
can force an image download. However, I can't get this to
work if I reference the image via a url.
|
by: Patrick Laurent |
last post by:
Hello
I have a program with many many inlined template functions
It is essential for the execution speed that every (or almost every)
function marked as inlined, becomes really inlined by the compiler.
I already compiled the program with Intel Compiler (ICL) on Visual C++, and
it works fine and fast. I verified that the functions are really inlined.
But with GCC 3.4 (Linux+Cygwin) or ICC (Linux), The same program is about 5
|
by: Ray |
last post by:
DB2 V7.2
Is it possible to list applications connected to a node by Auth ID?
Is it possible to force applications connected to a node by Auth ID or
am I forced to use App. Handle?
Thanks,
Ray
|
by: Ricky Chan |
last post by:
In the production environment, it always occurs and the worker process
did not recycle automatically. Therefore, it make the system service break
to client.
In development environment, we write a program to loop sth and force
outofmemory throw. however, when the w3wp exceed physical mem,
the process recycle automatically, no outofmemory throw.
Any idea?
thank you
|
by: Jon |
last post by:
I have the following functionality in my program when someone clicks on a
link, it brings up a page with an excel doc in it. I would however, like it
to force the save file dialog all the time, not open in the browser if excel
is there. How would I force that option?
Thanks
Private Sub lnkPrintFriendly_Click(ByVal sender As System.Object, ByVal e As
System.EventArgs) Handles lnkPrintFriendly.Click
| |
by: ago |
last post by:
Inspired by some recent readings on LinuxJournal and an ASPN recipe, I
decided to revamp my old python hack... The new code is a combination
of (2) reduction methods and brute force and it is quite faster than
the
ASPN program. If anyone is interested I attached the code in
http://agolb.blogspot.com/2006/01/sudoku-solver-in-python.html
|
by: yancheng.cheok |
last post by:
Hi all,
According to "How can I handle a constructor that fails?" in
http://www.parashift.com/c++-faq-lite/exceptions.html#faq-17.2,
whenever there is a constructor fail, we will throw exception.
However, how can we make the interface easy to use correctly and hard
to use incorrectly? Client may forget/ ignore from having a try...catch
block whenever they call the constructor. Is there any way we can
prevent this from happen?
|
by: zacks |
last post by:
I use some shareware CD/DVD burning software that has a command line
interface version. This allowed me to write my own custom SDK that
performs various CD/DVD burning operations from my own VB.NET
applications.
Recently, I had some problems reading DVDs that I had recently burned,
reading them with the same DVD device that burned them. So I wrote a
quickie verification program that simply attempts to binary read all
files on the disk.
|
by: Senthilkumar |
last post by:
Hi,
I have been using my vb.net for 2 years now, basically for database
application.
I have a client who lost is password for the mimer database and nobody
knows. So assuming if the password is less than 6 chars, i would like to
brute force it. Since this is a new approach for me, i would like to know
how to write a program.
|
by: Boon |
last post by:
Hello group,
I've been toying with a simple sudoku solver. I meant for the code to
be short and easy to understand. I figured "brute force is simple" --
who needs finesse, when you've got muscle, right? :-)
http://en.wikipedia.org/wiki/Sudoku
Thus, the strategy is to test every legal "move" and to backtrack when
stuck. A recursive function seemed appropriate. I'd like to hear
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it.
First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
| |
by: Hystou |
last post by:
Overview:
Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules.
He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms.
Adolph will...
|
by: conductexam |
last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one.
At the time of converting from word file to html my equations which are in the word document file was convert into image.
Globals.ThisAddIn.Application.ActiveDocument.Select();...
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols.
I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
|
by: 6302768590 |
last post by:
Hai team
i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
| |
by: muto222 |
last post by:
How can i add a mobile payment intergratation into php mysql website.
|
by: bsmnconsultancy |
last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...
| |