Hongyu of this software is strange, is suddenly think of a train of thought, then realized a bit.
EXE file has a very interesting place, as long as the internal integrity, you can run. such as an EXE file, we run the time, the computer know that he is an EXE so you can run directly. Suppose Hongyu changed it to a ". jpg" image file. Then the computer will think this is a JPG image file, and then as a picture file to run, we will see the image file can not be displayed. However, the internal or EXE complete code. Easy language can directly execute this JPG file, we use the command to force the computer to use EXE method to run it. In this way, we can achieve the purpose of a camouflage shell operation.
Let's talk about the software and password for someone else.For example, someone else's software is called 1.exe, we renamed this software to 1.jpg then we write a program called 1.exe, in the program to write a judgment, as long as the correct password to enter the right to run 1.jpg Others see is two files, 1.exe and 1.jpg Others will not know that 1.jpg is the source file, and change the name can be directly run. They will double-click open to look at, is a picture file that cannot be displayed. Then run 1.exe, the software will prompt for the password, enter the correct, 1.exe will run 1.jpg principle is so, may I say a bit wordy, do not understand the more look a few times.
the principle of adding advertisingThe principle of advertising and the same as above, just do not have to verify the password, just pop up a few seconds of the ad, and then automatically run 1.jpg ads can be your own settings window, can also be loaded on the page ads. It is recommended to load ads on the Web page so that it is easy to replace.
Extension IdeasThe source file changed to 1.jpg is likely to be lost, so we can change to DLL file, and then in our written easy language program to find out whether DLL files are missing, if missing on the reminder. This does not seem abrupt, after all, many software is called in the DLL file commands. If you are directly write the source code, you can load the sources into resources, every time you write and then run, so you can guarantee foolproof.
one more way to playWe add a disguise shell to someone else's software, you can pop up ads and encryption code to use the same method to collect the database. For example, the advertisement pops up the phrase "Please pay attention to the subscription number, reply xxxx, get the password" or "please subscribe to mail xxxxxxx, Get password automatically" very practical skill.
Easy language to add ads or passwords to other people's software (special ideas)