Let's talk about the software shell and how to shelling and shelling.

Source: Internet
Author: User

In nature, I think everyone should be familiar with shell. We can see from the above stories. Plants in nature use it to protect seeds, and animals use it to protect the body. Similarly, some computer software also has a program dedicated to protecting the software from unauthorized modification or decompilation. They generally run programs before they get control and then complete their tasks to protect the software. Just like the shells of animals and plants are generally taken for granted outside the body (but there is also a so-called "seed shell in the shell ). Because this program has many similarities in functionality with the shell of nature, such a program is called a "shell" based on naming rules. Just like computer viruses and viruses in nature, they are actually naming methods. Functionally abstract, the shell of the software is almost the same as that of the natural world. It is nothing more than protecting and hiding things in the shell. From a technical point of view, the shell is a piece of code executed before the original program. The code of the original program may be compressed and encrypted during shelling ....... When the files after shelling are executed, shell-the code runs before the original program. It restores the compressed and encrypted code to the original program code, and then returns the execution right to the original code. The software shells are classified into encryption shells, compression shells, camouflage shells, and multi-layer shells to hide the real OEP of the Program (entry point to Prevent Cracking ). For more information about the "shell" and related software development history, see Mr. Wu's "Everything starts with" shell ".

(1) Shell Concept

Compile the software and compile it into an exe executable file.
1. Some copyright information needs to be protected without any modification, such as the author's name. To protect the software from being cracked, shells are usually used for protection.
2. You need to make the program a little easier to use. Therefore, some software is required to compress the executable files of exe,
3. In the hacker community, shells and shells Trojans and other software to avoid anti-virus software. To implement the above functions, these software are called shelling software.

(2) The most common shelling Software

ASPACK, UPX, PEcompact less frequently used shelling software WWPACK32; PE-PACK; PETITE NEOLITE

(3) software used to detect shells and software in programming languages

Because we need to check the shell type before shelling.
1.fileinfo.exe, the shell detection software, is short as fi.exe (with powerful shell detection capabilities ).
2. age.exe, a programming language used by the detection shell and software, is a good combination of the two functions. It is recommended that the ageage2000 Chinese version (specialized detection and shelling type ).
3. Commonly Used programming language of the software: Delphi, Visual Basic (VB) --- the most difficult to crack, Visual C (VC ).

  • 1
  • 2
  • 3
  • Next Page
[Content navigation]
Page 1: Discuss the software shell and how to shell and shell Removal Page 1: Discuss the software shell and how to shell and shell Removal
Page 1: Discuss the software shell and how to shell and shell Removal

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.