How to extract signatures for determining file uniqueness? Delphi/Windows SDK/API
Http://www.delphi2007.net/DelphiAPI/html/delphi_20061108132642280.html
Confused: Use findwindow to determine the uniqueness of a file Program The false alarm may be too large. Which of the following is a good example of the pattern of the file that can be judged by Delphi. There are not many points, because there are too many things to learn.
Determine whether the file is unique or the window is unique. findwindow is used to find the window.
It is to determine the uniqueness of the file. In the past, we used findwindow () to find the running file name, and then determined whether the file exists. However, there are too many programs of the same type or window with the same name, which is easy to be mistaken, it means that you don't know if you can understand it.
If you know the file size in advance, you can use this
The main reason is to check whether the user knows how to use the data size. If the user adds an accesskey or performs a data volume operation, then knowing the size does not work.
Try to read the MD5 Signature of the file
I want to check a program. The MD5 token does not seem to work. The MD5 token is the authenticity of the certificate file. It indicates that it is the original token you released and has not been modified by others.
Continue to wait for answers from experts.
What is a signature?
Special commands are required to complete specific actions in the memory when the program is running,
When a program is running, the commands at the same memory address are the same
In the same program, a sequential address (with the same command) Intercepts this address. This is the signature.
How to extract signatures
Extract a continuous address from the shell disassembly of the program (the command is the same ).
What is the signature because the landlord knows?
Is there a specific example? I don't know much about assembly. It is best not to compile
Come to the experts to stop
Well, forget it. If happyggy says so clearly that you do not know it, then do not use a pattern to do what you want.
I just ask if I don't understand it. If I do, I still want to ask? Feature Extraction is not implemented only by feature extraction.
The pattern is also developed by anti-virus software. If you use it yourself, you can choose the one you like.
Are there any tips for an example?
You can add points if the score is not enough.
There's a big deal on top to help.
Http://www.delphibox.com/article.asp? ArticleID = 2576
Thank you, but what you gave me is an example of memory reading.
Continue to the summit.