473,385 Members | 2,028 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,385 software developers and data experts.

Checking a hash?

6
Hey I'm trying to make a anti cheat that checks if the hash is the same (to check if someone hooked something in) But I got no clue how to this
So if key is 12345 it continue else it closes itself can anybody help me out whit this matter?


Thanks in advance.



btw this has to be in c#
Nov 1 '08 #1
11 1434
joedeene
583 512MB
Hey I'm trying to make a anti cheat that checks if the hash is the same (to check if someone hooked something in) But I got no clue how to this
So if key is 12345 it continue else it closes itself can anybody help me out whit this matter?


Thanks in advance.



btw this has to be in c#
I'd like to welcome you to Bytes.com and to the community. I'd also like to the Posting Guidelines as you have posted a Homework Question.

As to the question, If you're wanting to use the Hashtable Class to help get the job done for you please clarify. Also, closing forms and processes aren't very difficult, I'm willing to help you furthermore if you can post more specific coding problems.

joedeene
Nov 2 '08 #2
fsssf
6
I know you cant help¨me withouth code but after reading the link you gave me I got this question I want this to happen:


If hash key is 12345 continue
else stop.
Expand|Select|Wrap|Line Numbers
  1. If  (hashkey != 12345)
  2. MessageBox.Show("passed");
  3. Continue()
  4.  
  5. }
  6.  
  7. else
  8.  
  9. {
  10.  
  11. MessageBox.Show("not passed");
  12. Close()
  13.  
  14. }
  15.  
Nov 3 '08 #3
Frinavale
9,735 Expert Mod 8TB
How are you creating your hash? Have you looked at the System.Security.Cryptography namespace?

After you create a Hash key you need to store it somewhere...like in a database or XML document or text file...so that you can check to see if it's been used already.

@joedeene:

The OP is asking for direction on where to start with their project...they have not asked for a full solution to their project and so this question does not fall under the category of "homework question". Also, this question doesn't pertain to HashTables but rather the act of Hashing to create a key in order for security checking purposes.

In the future if you think that a member has broken a rule on the forum do not take it upon yourself to scold them but rather hit the "report" button so that a moderator can take the appropriate action.

-Moderator Frinny
Nov 3 '08 #4
fsssf
6
I already got the hash code from the program but I don´t know how to calculate it whitin the program. I´ll try search on the link you gave me ( System.Security.Cryptography Namespace )

Would protecting the memory be effectfull so someone can't hook something in?
Nov 4 '08 #5
Frinavale
9,735 Expert Mod 8TB
I already got the hash code from the program but I don´t know how to calculate it whitin the program. I´ll try search on the link you gave me ( System.Security.Cryptography Namespace )
I don' t know what you mean when you say you already got the hash code from the program.

Usually what happens is that you create a hash (using something like the Objects made available to you through the Cryptography Namespace) on whatever data it is you need to check and store that hash. Once the data is submitted again you use the same hashing algorithm to once again create a hash based on the data. Once you have this hash you compare it to the one you stored. This method is used so that your application doesn't have to store user passwords...it's used when sending data to check data integrity etc etc.

You will not be able to re-create the hash code if your program did not create it in the first place...and the program you're using doesn't provide you with a way to do the check.


Would protecting the memory be effectfull so someone can't hook something in?
I have no idea what you're talking about here.

-Frinny
Nov 4 '08 #6
fsssf
6
I don' t know what you mean when you say you already got the hash code from the program.

Usually what happens is that you create a hash (using something like the Objects made available to you through the Cryptography Namespace) on whatever data it is you need to check and store that hash. Once the data is submitted again you use the same hashing algorithm to once again hash the data. Once you have this hash you compare it to the one you stored. This method is used so that your application doesn't have to store user passwords...it's used when sending data to check data integrity etc etc.

You will not be able to re-create the hash code if your program did not create it in the first place...and the program you're using doesn't provide you with a way to do the check.




I have no idea what you're talking about here.

-Frinny
I´m not sure if were talking about the same thing
each program got a unique hash
example google toolbars hash is xxxxxxx
I want my program to check if the hash is xxxxxx and not something else
Nov 4 '08 #7
Frinavale
9,735 Expert Mod 8TB
I´m not sure if were talking about the same thing
each program got a unique hash
example google toolbars hash is xxxxxxx
I want my program to check if the hash is xxxxxx and not something else
Are you talking about the GUID?
Nov 4 '08 #8
fsssf
6
Are you talking about the GUID?
yes I´m talking about GUID hope you can help me ( already thanks for replying )
Nov 4 '08 #9
Frinavale
9,735 Expert Mod 8TB
Ok you need to provide more information about what you are doing.

I don't know what your application is doing so I have no idea why you would have a need for the GUID...nor do I know what the the GUID is for. Is the GUID representing a COM object? A person? A computer???

Why do you need the GUID, how did you get it, what should you be doing with it?

Please provide more information so I'm clear on what the problem is.

-Frinny
Nov 4 '08 #10
fsssf
6
Ok you need to provide more information about what you are doing.

I don't know what your application is doing so I have no idea why you would have a need for the GUID...nor do I know what the the GUID is for. Is the GUID representing a COM object? A person? A computer???

Why do you need the GUID, how did you get it, what should you be doing with it?

Please provide more information so I'm clear on what the problem is.

-Frinny
My application is running a game I want to use GUID so people cant hook hacks in the GUID i s representing a hash string I need it to prevent hooking hacks in I should be blocking other hashes.
Nov 4 '08 #11
Frinavale
9,735 Expert Mod 8TB
My application is running a game I want to use GUID so people cant hook hacks in the GUID i s representing a hash string I need it to prevent hooking hacks in I should be blocking other hashes.
Does your application include the game as a resource?

Is your game running using COM or .NET?

If it's COM, a GUID is created for the application so that it can be registered (into the Windows Registry). If the GUID is changed and your application includes it as a resource than your application will crash.

If it's .NET then hopefully the application has been compiled with a Strong Name ...if the application is changed then the Strong Name will also change.

I haven't actually had to use Strong-Named assemblies yet....So please check out the link on Strong Names that I provided you with because it provides you with articles on how to create and use Strong-Named assemblies and will cover the topic much more thoroughly than I could.

(Note that ever assembly that a strong-named assembly references must be signed with a strong name as well)

-Frinny
Nov 4 '08 #12

Sign in to post your reply or Sign up for a free account.

Similar topics

11
by: John Victor | last post by:
In my mysql database, I've stored all the passwords using the PASSWORD() function. Now I'm running a test and need to compare the password in my php document to that saved in the database. I used...
12
by: Randell D. | last post by:
Folks, I have a form called "ourTestForm". Its a test form - nothing special - it contains five input tags - they are named one, two, three, four and five. The input tags are of type...
4
by: Patrick De Ridder | last post by:
My question has to do with checking whether someone is fraudulently messing about with data. ********************************************* Given a field, say fieldString I want to add a...
9
by: booksnore | last post by:
I am writing some code to search for strings that contain every letter of the alphabet. At the moment I am using the method below to check to see if a string contains every letter of the alphabet....
5
by: Henry C. Wu | last post by:
Hi, I'm trying to implement a way to security check the Hash of the Application.ExecutablePath. I placed the following ran the ff procedure at Sub Main Private Sub CheckHash() Dim fs As New...
12
by: Arash Partow | last post by:
Hi all, I've ported various hash functions to python if anyone is interested: def RSHash(key): a = 378551 b = 63689 hash = 0
21
by: Johan Tibell | last post by:
I would be grateful if someone had a minute or two to review my hash table implementation. It's not yet commented but hopefully it's short and idiomatic enough to be readable. Some of the code...
10
by: Brent | last post by:
I have a list of company names (say, IBM, Corning, General Motors, and another 5,000 of them). If I take a body of text, a news article, for instance, and I want to see which company names...
20
by: nicolas.pourcelot | last post by:
Hi, I want to test if an object IS in a list (identity and not equality test). I can if course write something like this : test = False myobject = MyCustomClass(*args, **kw) for element in...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.