How to extract the signature for determining the file uniqueness

Source: Internet
Author: User
How to extract signatures for determining file uniqueness? Delphi/Windows SDK/API
Http://www.delphi2007.net/DelphiAPI/html/delphi_20061108132642280.html
Confused: Use findwindow to determine the uniqueness of a file Program The false alarm may be too large. Which of the following is a good example of the pattern of the file that can be judged by Delphi. There are not many points, because there are too many things to learn.

Determine whether the file is unique or the window is unique. findwindow is used to find the window.

It is to determine the uniqueness of the file. In the past, we used findwindow () to find the running file name, and then determined whether the file exists. However, there are too many programs of the same type or window with the same name, which is easy to be mistaken, it means that you don't know if you can understand it.

If you know the file size in advance, you can use this

The main reason is to check whether the user knows how to use the data size. If the user adds an accesskey or performs a data volume operation, then knowing the size does not work.

Try to read the MD5 Signature of the file

I want to check a program. The MD5 token does not seem to work. The MD5 token is the authenticity of the certificate file. It indicates that it is the original token you released and has not been modified by others.

Continue to wait for answers from experts.

What is a signature?
Special commands are required to complete specific actions in the memory when the program is running,
When a program is running, the commands at the same memory address are the same
In the same program, a sequential address (with the same command) Intercepts this address. This is the signature.

How to extract signatures
Extract a continuous address from the shell disassembly of the program (the command is the same ).

What is the signature because the landlord knows?

Is there a specific example? I don't know much about assembly. It is best not to compile

Come to the experts to stop

Well, forget it. If happyggy says so clearly that you do not know it, then do not use a pattern to do what you want.

I just ask if I don't understand it. If I do, I still want to ask? Feature Extraction is not implemented only by feature extraction.

The pattern is also developed by anti-virus software. If you use it yourself, you can choose the one you like.

Are there any tips for an example?

You can add points if the score is not enough.

There's a big deal on top to help.

Http://www.delphibox.com/article.asp? ArticleID = 2576

Thank you, but what you gave me is an example of memory reading.

Continue to the summit.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.