473,396 Members | 1,898 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

Hacking protection. How to do that?!

I know that WinAPI has built-in hacking functions.
I even used them in C# with Pinvoke... To hack Minesweeper... It was easy... So...

How i could protect my application from process memory editing, deny DLL injecting and other hacking ways. HOW?!

Expand|Select|Wrap|Line Numbers
  1. /////////////////////////////////////////////////////////////////////////////////////////////////////////////////
  2. Hope WinAPI has something like void DontTouchMeOrIWillTerminateYou(bool protect)... 
  3. /////////////////////////////////////////////////////////////////////////////////////////////////////////////////
Sep 19 '09 #1
10 2769
weaknessforcats
9,208 Expert Mod 8TB
Sorry, this site does not provide assistance to hackers.
Sep 19 '09 #2
Tassos Souris
152 100+
Actually he is trying to avoid hackers :)

And you said that true hackers are bad? :)
Sep 19 '09 #3
Savage
1,764 Expert 1GB
@ernestasju
Well I think many software companies would like to know solution to that.
If something like that existed they wouldn't spend millions on state of the art protection, which in the end still fails to do it's job.

Probably the best protection is over the internet, like the master servers in online games which check for original cd keys. You would agree that is probably a lot harder to hack master server, then it is to hack client application, but that way you oblique your users that they must have internet connection to use your software.
Sep 19 '09 #4
donbock
2,426 Expert 2GB
@ernestasju
Analyze the threat:
  • Who are you trying to defend against -- your users or third-party attackers?
  • How skilled are the attackers?
  • How motivated do you expect the attackers to be? This is related what they gain by attacking your program.
Sep 19 '09 #5
donbock
2,426 Expert 2GB
@donbock
Also ...
  • What do you lose if the attackers succeed?
  • What do your users lose if the attackers succeed?
The threat assessment should help you decide how much anti-hacking effort is appropriate.
Sep 20 '09 #6
Firstly, it's multiplayer (free) game...
You maybe don't know how it is annoying to see aimbots and speedhackers...
They just wanna blow it up...
I was hacker only one time: to test how difficult it is...
My main aim is protection working on all Windows OS (XP, Vista and Seven)...
Don't want to use 3rd party soft because it is buggy (try play Gunz on Win7 x86, even with correct files I get blue screen and some dump words and numbers...)So I need idea, how?...
Pls... Give me one...

Plus game is P2P so master server idea flies away....
Sep 20 '09 #7
weaknessforcats
9,208 Expert Mod 8TB
Actually he is trying to avoid hackers :)
How do you know that? The OP has already admitted hacking Minesweeper. I don't know this person. Maybe the OP wants advice on how to prevent his own virus from being compromised by removal software.
Sep 20 '09 #8
Tassos Souris
152 100+
@weaknessforcats
oh come... trust your fellow man :)
Sep 20 '09 #9
Savage
1,764 Expert 1GB
@ernestasju

Then you are looking after RACS: A Referee Anti-Cheat Scheme for P2P Gaming
Sep 20 '09 #10
@weaknessforcats
Virus?!

Wow I hate them, dude...
Sep 20 '09 #11

Sign in to post your reply or Sign up for a free account.

Similar topics

0
by: ChangAya | last post by:
I use binary log on mysql system. Yesterday i found some hacking attempt on my machine. ( I found some unknown queries on binary log) But i don't get any information about hacking query...
0
by: SoftComplete Development | last post by:
SoftComplete Development Updates EXECryptor to v. 2.1.20 Software piracy! Cracked serial numbers! Thousands of commercial products are posted on the warez sites and become available to all who...
3
by: nathanvi | last post by:
Hi, i've a mdb access file and i launched Tools->Protection->SettingAutomaticProtection (sorry if translation isn't fine but the language in my PC is not english :-( ) two weeks ago .. In other...
0
by: masterjuan | last post by:
Networks Hacking (hack C:/ drives, severs...)and security holes all on my website & hacking commands and I explain ways of erasing your tracks so you dont get caught doing "bad" things... What do...
6
by: enes naci | last post by:
i would like to know about hacking in python too whether its illegal or not is not the point and anyway it doesn't mean i'm gong to use it.
8
by: diana.ruwanika | last post by:
hey how do you hack in to computers ?
0
by: candra | last post by:
How Hackers Attack? -Yahoo 4.0 -MSN Messenger -Icq Protection -Icq Nukers -Icq Exploits -Aim Exploits -AOL
3
by: Dave | last post by:
Does Microsoft have ANY plans for .Net to allow developers to protect their software from decompilation of the intellectual property or easily hacking an otherwise secure licensing scheme by simply...
0
by: e.expelliarmus | last post by:
check this out buddies. kool website for: * hacking and anti hacking tricks * anti hackng tricks. * registry tweaks * orkut tricks * small virus * computer tricks and loads of different...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.