2
votes
2answers
66 views

Best way without an internet lookup to secure a paid for application

I have an application that I am currently selling that I want to expand. However I don't want people to just be able to copy the EXE and give to their friends etc. I know its an almost impossible ...
0
votes
3answers
136 views

C# Application cracking

we have created an application like adobe reader to read a special encrypted document file format which does recognize only by our application. what we want to do is to let user buy the application ...
3
votes
2answers
293 views

Intercepting ASP NET MVC POST Values

A recent MVC3 project of mine has been hacked by my lecturer and he won't tell me exactly how he did it until he makes a presentation to the class in a few weeks. I however cannot wait this long. My ...
-3
votes
6answers
1k views

The simplest code hacking [closed]

I have the following code: #include <iostream> #include <string> void main() { std::string str; std::cin>>str; if(str == "TheCorrectSerialNumber") ...
1
vote
1answer
190 views

Indomitable beast: a 2d char array, inside a structure, in the belly of an unmanaged dll

Having gird my loins and ventured into Legacy Land, having hacked, p-invoked and marshaled every type of wild beast, I now stand before a creature so fierce that, as far as I can tell from an ...
0
votes
0answers
105 views

C# Mysl Database connection and server download Protection

I have created an app that uses Mysql Connector to connect to a Database in which I perform queries of all kinds e.g. Insert, update select etc. This app also downloads files through FTP connection ...
6
votes
5answers
785 views

Faster modulus in C/C#?

Is there a trick for creating a faster integer modulus than the standard % operator for particular bases? For example, could power-of-two bases be more 'open' to hacking possibilities? For my ...
0
votes
2answers
389 views

Preventing Memory Dump of Packed .Net Executable?

Is there any way to prevent the Dumping of the Pure C# Assembly Executable loaded into the memory which is originally protected by a 32 Bit Exe Native Code Wrapper.
4
votes
1answer
2k views

I've been hacked. Evil aspx file uploaded called AspxSpy. They're still trying. Help me trap them‼

I'm also putting up the contents of the .aspx file that was uploaded. When I try to access it, I get prompted for a password, looking at the code, there's a harcoded password but it looks like some ...
0
votes
1answer
147 views

Writing custom third party client emulators

I've been struggling with this question for years now. I've seen programs that emulate servers for example World of Warcraft private servers and client emulators for example botting programs. ...
1
vote
1answer
219 views

How to solve “Could not establish trust relationship for the SSL/TLS secure channel” in a single call of a multithread app

I am writing a nettwork app, and I'm getting "Could not establish trust relationship for the SSL/TLS secure channel" exception. From the documents I've researched, I gathered that this can be solved ...
0
votes
1answer
439 views

Flash hacking / intercepting / sending

I have a winforms control with a website loaded in there. The website has a flash file loaded (a big webbrowser game) and I wish to know wether it be possible to "hack" into that flash game and send ...
0
votes
2answers
150 views

How to download latest XML file from our website securely?

We're writing a console app which is to be installed on client's machines. It's possible we'll want to update an XML file used by the app. How can I ensure the file is downloaded safely from our ...
5
votes
6answers
1k views

Hacking your own application

I am a web developer that is very conscious of security and try and make my web applications as secure as possible. How ever I have started writing my own windows applications in C# and when it comes ...
0
votes
1answer
192 views

Best method to check a file hasnt been modified or altered

I'm working on a solution and one of the features is to check that some files have not been tampered in other words hacked. I was planning on using the MD5 sum with a mixture of created and modified ...

1 2
15 30 50 per page