Encrypted Burning Technology

Source: Internet
Author: User
Summary: encryption and Burning Technology
Currently, encryption and burning technology and related products can be divided into two categories: ① pure software processing; ② soft and hardware combination. Among them, pure software processing can be divided into three categories: directory/file hiding, directory spoofing and third-party software.

The so-called Directory/file hiding, its principle as early as the MS-DOS era is well known-by modifying the directory/File Attribute byte, so that it hides. However, due to the special process and
The disk read and write features of Windows 9x and other systems make this operation object become the image file for the data to be engraved, that is, files such as. Cue and. CIF used by common burning tools. Specific operation,
Use the ultraedit, winhex, and other hexadecimal editors to analyze and locate the corresponding attribute byte, change it to "04", save the disk, and then burn it.
The so-called Directory spoofing uses the special structure of the image file to modify the actual display name of the directory to be kept confidential so that it is inconsistent with the actual operation name, resulting in file access exceptions, confuse others with the illusion that "the disk has a problem" or "the system has a problem. In addition, this method is often used in conjunction with directory hiding to enhance the confidentiality effect.

The basic method of third-party software encryption is to re-code or shell the raw data before or when it is burned, and place the decryption program in the disc Autorun. Only after the password is verified,
To see the raw data. Otherwise, even if you can browse the CD, you will only see the processed "processed products ". As for the specific implementation method, it is "the Eight Immortals go through the sea and show their magical powers ". Many popular models on the market
Encryption and recording software, such as CD-protector, secureburn, and cryptcd.
As for "Soft-hardware combination", it can be divided into three categories. One is to determine whether the disc information is available by means of determining the BIOS of the motherboard and setting the hard disk encryption point. However, this will inevitably reduce the versatility of the disc and the practical value of the engraved disc will be greatly reduced. Therefore, this type of technology is of little significance to ordinary users, and there are few such products on the market.

Another type is to use "overburn ". The so-called "overburn" can be understood in two ways. One is to burn data that exceeds the nominal value. The nominal value usually refers to the standard value: 74min @ 650mb and
80min @ 700 mb. Because the outer ring diameter of the disc is large and the radians are large, a lot of available physical space is left for the burning slot. Therefore, the outer ring is encrypted and the encrypted information points can be set to increase
Capacity, and can play the role of disc encryption. Because the ultra-engraved part is completely carried out in the outer ring of the optical disc, the slot distance and depth are not lower than the minimum limit stipulated by the Orange Book. Therefore, in theory, the normal reading of the optical drive is not affected.
One kind of understanding is to comply with the Orange Book 2 (CD-R disc specification standard agreement) of large-capacity CD burning, such as 90min @ 800mb and 99min @ 870mb of ultra-burning function. Chao
Engraving requires the support of recorder and software, and has certain requirements on the quality of CD-R disc.
The third category is the use of a special optical track writing method to make a fuss about the storage form of the disc data. This technology is often used
This function is used to prevent copying of CDs ". Many genuine software discs cannot be copied, even if they cannot be used. Typical examples include free lock and safedisk. For example
Safedisk implements "anti-Copy" of the CD by verifying digital signatures, Data Protection Code, and other means ".
Next we will introduce several common encryption methods and corresponding cracking methods in practical applications.

Encryption: Do not use my cd
When talking about disc encryption, you may know some methods, such as prompting you to enter a password when using the disc, hiding the real path of the source file, and generating oversized files that cannot be copied, all these can be used to create various types of encrypted discs. Next let's take a look at how to encrypt the disc.

Add password to the CD
Adding a password to the disc is the simplest method of encryption. when viewing the disc, you must enter the correct password. Otherwise, you cannot browse or use any files on the disc. This encryption method is easy to operate, but has relatively strong security, so it is very suitable for novice players.
You can use secureburn to add a password to the disc. The biggest feature of secureburn is to protect the password of the disc before it is officially burned. Then, you can directly obtain the password-protected disc through the built-in burning function of the software.
1. secureburn can be downloaded from the http://www.secureburn.com website.
Because the operating method is similar to that of Windows resource manager, you only need to open the folder in the existing hard disk, find the files to be burned, and drag them directly to the disc file list on the right, you can add a burning file.
2. After completing the above steps, click the "record" button to burn. However, a Password Confirmation window will appear before the official start of burning. Enter a string of characters here as the protection password, and then you can start burning.
Tip: You must select the "secureburn cd" check box to create an encrypted disc. Otherwise, the program will create a general non-password-protected disc.
3. How can I use secureburn to burn an encrypted disc? It's easy to use this disc.
After you put the burned disc into the optical drive, you will see the prompt window shown in Figure 2. You only need to enter the correct password to open the disc file. Otherwise, you will not be able to read the data in it, therefore, you must remember the password of the CD. Otherwise, you can only watch it drool.
Tip: when setting a password, it is best not to use your own name, phone number, birthday, and other strings that are easy to be guessed by others, and the password length should be greater than 8 digits, in this way, attackers can avoid arbitrary cracking.
Allow files to run only on the disc
Some friends want to make encrypted discs that cannot be directly copied by others. We can use CD-protector to create a disc that cannot be copied by others.
CD
-The working principle of protector is to add a shell to the executable file and use this shell to determine whether there is any audio track generated after encryption on the disc. If yes, it runs. Otherwise, it will
Refuse to run the CD. Therefore, using Cd-protector to create a CD is highly confidential. Others cannot directly copy files to obtain important files on the CD.
Copying all the files to the hard disk is still not usable. If you want to copy the files on the CD, you can only copy the entire CD. Therefore, this method is very suitable for the encryption of the CD that requires installation, it can also be used for direct
Connect the program running from the CD.
CD-protector can be downloaded from the http://www.newhua.com.cn/down/cdp3setup.exe, although it is not complex to use the encrypted disc, but because the program only encryption function, and does not provide the disc burning function, here we use the Nero software to burn the disc.
1.
After running CD-protector, set "file to encypt" (files to be encrypted) and "custom message" in the window shown in figure 3"
(Error message), "Phantom Trax directory" (output save path) and other options, and enter 00 in the "encryption key" dialog box
The two strings to FF serve as the encryption key.
2. after completing the preceding settings, click the red "accept" button. Then, CD-Protector encrypts the selected source file, after encryption is completed, you can see in the original folder that the source file icon has been replaced with a unique CD-Protector icon, and an additional audio track file is added.
3. Run the Nero burning program and create a new audio CD task. However, you need to set the program accordingly:
① Do not select "Write CD text on cd" in the "audio CD" tab (write text on the CD.

In the "CDA options" tab, select "Remove silence at the end of *. cda tracks" (clear *. cda audio track ).
Mute at the end) and "cache the track on harddisk before burning" (Cache audio tracks on the hard disk before burning)
③ Remove "finalize cd" from the "burn" label.
After completing the preceding settings, click "new" to create a task, and drag and drop the audio file produced by CD-protector to the window where the audio is burned.
4.
After the data is burned, repeat Step 3 to burn the audio file produced by CD-protector. That is to say, this method is used to burn the same audio file twice. Maybe you may find it strange: Why?
Do you want to burn the same file twice? This is because CD-Protector uses audio track encryption technology to determine whether a file can be used by detecting whether a sound track exists.
5. Connect
Create a new Read-Only CD (ISO) task in Nero, select "strat multisession disc" in "multisession" (Multi-record"
(Start recording multiple CDs). Then, drag and drop all files generated by CD-Protector except audio files into the data burning window and start burning, in addition, the burning options also need to be compared with the previous
The recording track settings are the same.
6. After the data is burned, we get an encrypted disc. In this case, you can run the "record> View track" command in Nero to view the disc (figure 7 ). Here we can see that the same audio file is significantly different after being burned twice, which is why it needs to be burned twice.
7.
Finally, put the encrypted disc into the optical drive. At this time, the original executable file icon has become a unique icon of Cd-protector, and the program can run normally after double-clicking. However
-The protector-encrypted disc consists of two audio tracks and a data track. The encrypted executable file in the data track reads the audio track on the audio disk when it is run, if it is corresponding
So if you copy the file to the hard disk and run it again, an error message is displayed. In this case, the files stored on the CD are safe.
Create a personalized encrypted Disc

Through the above operations, we have mastered several common disc encryption methods. Here I recommend a master who can create a personalized encrypted disc. As an encryption disc software, the disc encryption master
You can directly modify the CD image file, such as hiding directories and files in the CD image file, converting common files into ultra-large files, or changing common directories into file directories, so with its help, we can
Easily create your own personalized encrypted disc.
The disc encryption master can.

After running the disc encryption master, click the "open image file" button in the toolbar to load the ISO file to be processed, and then you can see the window shown in figure 17. This includes the file directory, hidden directory,
The regular and autorundirectories use the autorun.exe(2gb 、autautorun.infand description. txt files. Although there are many conversion methods
You only need to select the corresponding file and click the corresponding button on the toolbar.
1. Hide the directory or file in the CD image
Select the directory or file to be hidden and click "hide. After the image file is engraved into the CD, Hidden Directories Or files cannot be seen in the resource manager.
Note: Do not hide autorun.infureautorun.exe; otherwise, the CD will not run automatically.
2. Convert the files in the CD image into ultra-large files.
Right-click the file to be enlarged and select the file to be oversized. After the image file is engraved into the disc, the file is displayed as 2 GB in the resource manager!
Note: Do not change autorun. inf to a large file; otherwise, an error such as invalid operations may occur.
3. Change the directory in the CD image to a file
Select the directory to be changed to file, and then click "directory to file. After the image file is engraved into the CD, the directory is displayed as a file.
4. Create a personalized encrypted Disc
After hiding all the directories and files to be encrypted, or changing the directory to a file, click "Write disc password, in the dialog box that appears, select the password format, the program that runs after the password is verified, and the disc icon, and enter the password (Figure 18 ). You can only access the Hidden Directories, hidden files, and file directories after the password is verified.
Because the disc encryption master is powerful and easy to use, it is suitable for friends of various levels to perform disc encryption operations.

Respondent

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.