Page 2 of 3 FirstFirst 123 LastLast
Results 11 to 20 of 26

Thread: how to make a program portable?...

  1. #11

    ...

    Program was made with Visual Basic 6.0 I see... and using PEID I find that its using armadilla protection. I dont know if that matters. Its about 8mb extracted. I could probably even extract the contents of the extracted exe but I dont know if its gonna do any good. I just want to find out what drivers/services/reg entries/ the program is relying on. I know during the install I see files goto c:\windows\system32\ so maybe it would just be useful in this case and in any other case to have some kind of tracking to see what the installer modifies or creates in the case of viruses as well as trying to make something portable. I know UPX could compress it and make it to where its just one file that I need to run the program but I dont even need it to be one file a folder would be just fine to keep on my USB. Well thanks for the help

  2. #12
    Senior Member nihil's Avatar
    Join Date
    Jul 2003
    Location
    United Kingdom: Bridlington
    Posts
    17,188
    Hmmm,

    I find that its using armadilla protection.
    Which means that it is someone else's intellectual property, and what you are proposing is illegal.


  3. #13

    ...

    I am not talking. Reverse engineering. I do not wish to crack the program. I already "own" the rights to running the program at its current state. Why does this have to be such a technical argument. I was just looking for a program that tells you exactly what the installer does. Isn't this good to know for everyone that wants to be computer security savvy?

  4. #14
    The Doctor Und3ertak3r's Avatar
    Join Date
    Apr 2002
    Posts
    2,744
    Look it is simple..

    It has copy protection?

    Anything else is cracking.. reverse engineering IS CRACKING
    I was just looking for a program that tells you exactly what the installer does
    that is one step in reverese engineering..


    Isn't this good to know for everyone that wants to be computer security savvy?
    You had better explain what this has to do with Computer security..
    If your were asking how to findout what XYZ virus does when it installed. to learn how to remove it .. well we may have been a little more helpful


    I am not talking. Reverse engineering.
    Why does this have to be such a technical argument.
    Wrong.. I think you will find the argument is Legal..
    "Consumer technology now exceeds the average persons ability to comprehend how to use it..give up hope of them being able to understand how it works." - Me http://www.cybercrypt.co.nr

  5. #15
    might as well delete this thread... I am embarassed to look at it. As I should be for asking such a stupid question... Thanks for making me see the light.

  6. #16
    Senior Member nihil's Avatar
    Join Date
    Jul 2003
    Location
    United Kingdom: Bridlington
    Posts
    17,188
    I do not wish to crack the program
    From what you have said earlier that is exactly what you are proposing to do.

    I already "own" the rights to running the program at its current state
    No! you do not. You (may) have been granted a licence to use the program in accordance with the terms and conditions of its EULA. It would not be protected by armadillo otherwise. Any attempt to circumvent the normal installation process, and functionality is a violation.

    I was just looking for a program that tells you exactly what the installer does
    That is reverse engineering. At best you will find out what has been installed. Google for the tools to do that, you will probably need one for the system and one for the registry.

    Isn't this good to know for everyone that wants to be computer security savvy?
    No, it is irrelevant. If you are security savvy you only install software that you trust, and you are only interested in what has been installed and what it does.

  7. #17
    http://www.prismmicrosys.com/install...itor-index.htm
    http://www.devhood.com/tools/tool_de...px?tool_id=432

    Here are two programs I found if you anyone was interested. I know some of us probably download stuff from other than microsoft or sourceforge..

    I was just looking for a more forward answer..someone speaking from experience..but I do understand what kind of forum this is so I apoligize in trying to make an accomplice to any EULA violations..

  8. #18
    Senior Member
    Join Date
    Mar 2004
    Posts
    557
    Hi

    I was just looking for a program that tells you exactly what the installer does

    If you want to know what actually gets installed (inclusively registry entries),
    use installwatch[1]. If you want to understand what the program is accessing while
    running use filemon[2], regmon[3] and maybe process explorer[4]; and have a look at
    this tutorial[5] for a general guideline to forensic analysis.

    I see that you have found two other monitoring programs. Would you mind
    sharing your experience, once you performed some tests?

    Cheers



    [1] http://www.epsilonsquared.com/installwatch.htm
    [2] http://www.sysinternals.com/Utilities/Filemon.html
    [3] http://www.sysinternals.com/Utilities/regmon.html
    [4] http://www.sysinternals.com/Utilitie...sexplorer.html
    [5] http://www.antionline.com/showthread...hreadid=272469
    If the only tool you have is a hammer, you tend to see every problem as a nail.
    (Abraham Maslow, Psychologist, 1908-70)

  9. #19
    AO Curmudgeon rcgreen's Avatar
    Join Date
    Nov 2001
    Posts
    2,716
    that it is someone else's intellectual property, and what you are proposing is illegal.
    WTF, are you some kind of vigilante for software companies?
    That's a little harsh. If I edit my registry to remove spyware
    am I guilty of IP violations because I want to know how they
    managed to install it in the first place?

    Did you know that if a stream flows through my land, I cannot
    arbitrarily dam it up and prevent the water from flowing
    downstream to others? Some things resist being categorized
    as property

    http://www.fsf.org/
    I came in to the world with nothing. I still have most of it.

  10. #20
    Senior Member nihil's Avatar
    Join Date
    Jul 2003
    Location
    United Kingdom: Bridlington
    Posts
    17,188
    rcgreen I shall be charitable and assume that you have been drinking.

    WTF, are you some kind of vigilante for software companies?
    No, but I do have to consider my responsibilites towards JupiterMedia. The rules of this site are clearly stated on the front page.............you really should know that by now?

    If I edit my registry to remove spyware, am I guilty of IP violations because I want to know how they managed to install it in the first place?
    WTF? How is that remotely related to someone wanting to take proprietary software, modify it to "make it mobile" and run it on a machine that he admits that he doesn't have permission to install software on anyway??????????????? The only bloody reason he wants to know this is to achieve that objective.............the guy has all the makings of an "ex-employee, soon to be unemployable"........... we do have a certain responsibility towards these "overenthusiastic individuals" IMO.......... we need to dissuade them from lines of experimentation that will clearly get them into trouble?

    Some things resist being categorized
    Legally owned and copyrighted intellectual property, covered by a clearly stated EULA is not one of those things ..................... particularly when it is protected by a system such as Armadillo.

    Get a life folks, this is NOT a skiddie cracking site


Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •