Belgeci , 2422 belge yazmış

Enterprise REXX

Target Program: Enterprise REXX (WinREXX)Protection: Nag(s), 21 day time limit, limited number of runs ("Quiver" protection)Cracked by: drlan [Me’97/C4N]!Location: http://www.winrexx.com/Trial/ Tools needed:– SoftICE Win95 3.01– Hex Editor (I like PSEdit and Hex Workshop) Conventions used:> denotes a SoftICE command Download the target and run it a few times to get a feel for what’s going…

Symantec Visual Cafe

Abstract: How to gain an understanding of a rather simple time evaluation protection without using SoftICE or any other code debugger. Demonstration of some principles of code reading and a most excellent interactive disassembler. Target: Symantec Visual Cafe 30 day evaluation supplied CD ROM PC Magazine August 1997. Tools:IDA Pro 3.5 (a most excellent tool well…

Adding Functionality You’re Not Supposed To Have (II)

Tools and Files needed:SoftIceWdasm 8.9 (for some debugging, disassembling)Your favorite hex editorReal Player 4.0 available at:http://www.real.com/products/player/index.html(needs serial # to function as the Plus version) Optional Items:RealPlayer Encoder (free) available at:http://www.real.com/products/encoder/index.html    Hello once again!  Here is the final installment in my Real Player tutorial.  We will now see how to enable the saving of ANY…

PIQ considerations

Ok… I have read the essay by Camel Eater about the Prefetch Instruction Queue, butI have some doubts on his usage in protection schemes. Around three year ago I wrotea little program for the PIQ size determination… This is the source: ; FILENAME: prefetch.asm; AUTHOR: +Heres (1994); ==================================================; TASM /m2 prefetch; TLINK /t prefetch;                .MODEL…

Killing those Javascript Messageboxes

First thing, WHY would you want to kill javascript messageboxes? Well,same reason you’d want to kill cookies, they’re annoying, and they dopop up quite often, usually as disclaimers. Please note that Netscapeuses MessageBoxA to display the box. a. Load up Netscape (assuming you have SoftIce loaded). Pick a page witha Javascript MessageBox, like the one…

Fido2Int mailer v. 2.00 Key Generator

 This essay deals with a tough key file based protection scheme. Key file based schemes are those, where certain file, containing encrypted data unlocks all registered functions of the target program when it is valid and present. The name of this file could be different, but the file name extension is very frequently the word…

Novell Netware 3.12 (2)

                    As we all know, Novell Netware comes with different number of "user licenses"like 25 User, 50 User, 100 User an so on. In this session we  will discusshow to change those licensed users value. I hope my essays about netwarereverse engineering will be usful for netware users. These essays only avialable via Fravia’S PAGE…

Encryption, a short tutorial

INDEX: 1. Introduction (the purpose of encryption)2. How encryption works3. About decryption4. How to reverse engineer an encrypted file    (brute force attack and figuring out the key)5. Algorithms (most known)6. Encryption programs & Info                          [1. Introduction (the purpose of encryption).] The general purpose of encryption is to scramble computer-information with a password, which only…

An interesting tool: Screen Ruler

I will in this essay:1) Use sruler in order to reverse engineer sruler.exe itself, showing you a new method to get at the code that interests us ("the pixel shortcut" method)2) Denag sruler.exe and examine its three nag functions (delay, quiver nag, "oldie nag")3) Add "our" functionality to sruler.exe transforming a decimal notation (for us…

How to fix incomplete posted warez

  "What good is reverse engineering if you can’t getthe warez you really want?" There comes a point in your search for software that is simply not available online in any form…. except for what’s in the newsgroup supermarket. The features and functions may not be present in shareware, demoware, crippleware, you get the idea…