|
Yes. I simply mean to point out that there is no way to accomplish what you want, there are only ways to make things somewhat more difficult.
Just create the file in the Application Data directory and hope for the best. That's what I do.
|
|
|
|
|
|
It CAN be done. Anybody know a good rootkit?
|
|
|
|
|
That's what I'm afraid of. This is not a trait of a well-behaved application.
|
|
|
|
|
Michel Godfroid wrote: good rootkit
Oxymoron
Why is common sense not common?
Never argue with an idiot. They will drag you down to their level where they are an expert.
Sometimes it takes a lot of work to be lazy
Individuality is fine, as long as we do it together - F. Burns
Help humanity, join the CodeProject grid computing team here
|
|
|
|
|
The only thing I can think of is for you to put your file into Isolated storage. It's not a perfect solution, and Windows can still get at the file but it's probably going to be the best fit for your application.
"WPF has many lovers. It's a veritable porn star!" - Josh Smith As Braveheart once said, "You can take our freedom but you'll never take our Hobnobs!" - Martin Hughes.
My blog | My articles | MoXAML PowerToys | Onyx
|
|
|
|
|
I hope the victim's antivirus can still scan it there.
|
|
|
|
|
I have only good intentions . I'm makein this aplication for my nephw who spends a long time in front of the PC.this should shutdown the system after the a period of time expires:P
|
|
|
|
|
Ah, I knew it was something user-hostile.
Your intentiions don't matter; the other guy's do.
Maybe you could use a database to store a usage log.
|
|
|
|
|
I have found that nephews have a tendency to know more about computers than uncles. Take the power cable, the internet cable, the cell phone, all usb cables, the printer, and the duct tape away and they will still find porn on the internet if left unsupervised.
|
|
|
|
|
There's a Japanese proverb: "The best place to hide a horse is among horses." Using that concept, you could put your XML file in C:\Windows\System32, where no one will ever find it by blind searching.
You could make it even harder to find by changing its name every time you use it, storing the new name encrypted in the Registry.
To protect against deletion, you could store two copies of the file, and if one is deleted, restore it from the other copy. If both are deleted, your program could restore them from the Recycle Bin.
|
|
|
|
|
I'm sure there are many horses in C:\Windows\System32, however modern Windows versions will not let you add to them...
|
|
|
|
|
Create your file. Encrypt it. Name if KE1lSD1.dll, or some other meaningless name, then store it
in Windows\System32. It'll look like any other DLL and no one would ever know. Even if someone
opened it with Notepad it would look like any other DLL they opened with Notepad.
Everything makes sense in someone's mind
|
|
|
|
|
Kevin Marois wrote: it would look like any other DLL they opened with Notepad
No, it won't. Have you opened a .net DLL in Notepad?
|
|
|
|
|
Yes I have. The average user won't know the difference.
Here's a snippet of a random DLL I found in System32 opened in Notepad. if you encrypt a file, it will look similar to the following:
Q 3À…Òt‹Âë‹U9QtRèúûÿÿ]Â ÌÌÌÌÌ‹ÿU‹ìV‹ñè³ûÿÿöE
tVèÑÿÿY‹Æ^] ÌÌÌÌÌ‹ÿU‹ìƒì ‹MVEìP¾ VèÂçÿÿ…À…Ç
SWEôPV3ÛShP‹pÿuìÿT‹p‹ð;ó…ê EèPEøPEðPÿuôèHØÿÿ‹ð;ó…à 9]ðj^‰]ü†¤ ƒþ…› ‹EèSSSS‰EäEäPÿuøÿuüÿuôÿL‹p‹ð;óuijèÞÐÿÿ;ÃYtÿu‹Èè£Úÿÿ‹øë3ÿ;ûtFjEàPÿuøÿÌ‹pƒÄP‹Ïè§óÿÿ‹ð;óu‹E;Guÿwÿuÿ ‹p…Àtj^j
‹ÏèDãÿÿëj^ÿEü‹Eü;Eð‚\ÿÿÿÿuøSÿ5ä ‹pÿ‹pÿuôÿX‹pƒþ…§ jèDÐÿÿ;ÃYtÿu‹Èè Úÿÿ‹øë3ÿ;û„ƒ j,è Ðÿÿ;ÃYtÿu‹Èè£Ùÿÿ‹Ø…Ût^ÿu‹ÏÿuèÊñÿÿ…ÀuM‹Ïè&ôÿÿ…ÀuBÿw‹Ëèfûÿÿ‹ð…öu
‹Ëè$ïÿÿ‹ð…öt‹Ïè7òÿÿ…öu‹MSèãéÿÿ…Àu
…öt j
‹Ëèþÿÿj
‹ÏègâÿÿÿuìÿX‹p_[^É ÌÌÌÌÌ‹ÿU‹ìV‹u‹Îè<áÿÿ…À‰EtEP‹ÎèIáÿÿ…Àt j
‹ÈèIâÿÿƒ} uâ…öt j
‹Îè" ^] ÌÌÌÌÌ‹ÿV‹ñ‹…ÀtPè£ÿÿÿÿvj ÿ5ä ‹pèÏÿÿ^ÃÌÌÌÌÌ‹ÿU‹ìƒìt¡p ‹pSV‰Eü‹EW‹}j,‹Ù‰E˜èöÎÿÿ…ÀYtƒ ƒ` H ‰ ‰H$‰H(ë3À‹ð÷ÞöƒæòƒÆ‰…Ù ‹ÈèÖàÿÿ‹ð…ö…¹ Wè'Ïÿÿ‰C÷ØÀƒàòƒÀ‹ð…ž {¾‹p¥E"P¥j
j ¥h(‹pÿu˜¥ÿT‹p…ÀuijY¾Ø‹p}¬ó¥E¬Pf¥ÿü‹pD ‰EEPE¬PEŒPj j ÿu"ÇEŒ
ÿ8‹p…ÀuEœPE¬Pÿü‹p…À|
uœ{¥¥¥¥ÿu"ÿX‹pSÿu˜èuôÿÿ‹ð…öt‹…Ût j
‹Ëèà ‹Mü_‹Æ^[è¿- É ÌÌÌÌÌ‹ÿU‹ìV‹ñèˆþÿÿöE
tVèÜÍÿÿY‹Æ^] ÌÌÌÌÌ‹ÿU‹ìQhH¡‹ph¡‹pèRÎÿÿ…Àu@é‘ ¡L¡‹pVÿpèÑÿÿ‹ð÷ÞöFulS¾° èÖßÿÿ‹X¡‹p‹Ëè!ßÿÿ…À‰EütGW‹Eü‹x‹G;EtEüP‹Ëèßÿÿƒ}ü uáë$‹Ïè/éÿÿ‹ð…öuÿuü‹
X¡‹pè èÿÿj
‹Ïènûÿÿ_è¥ßÿÿ[h¡‹pÿØ‹p‹Æ^É ÌÌÌÌÌ‹ÿU‹ìQ}ÿ vjWXé† ShH¡‹p»¡‹pSè†Íÿÿ…Àu@ëm¡L¡‹pVÿpè?Ðÿÿ‹ð÷ÞöFuLW¾° è
ßÿÿ‹=X¡‹p‹ÏèXÞÿÿ‰Eüë‹H‹A;EtEüP‹Ïè\Þÿÿ‹Eü…Àuãë
ÿuèúÿÿ‹ðèüÞÿÿ_SÿØ‹p‹Æ^[É ÌÌÌÌÌ‹ÿV‹ñƒ> tè‡çÿÿF ‰ ‰F$FPÿà‹pƒ& ^ÃÌÌÌÌÌ‹ÿU‹ìƒìƒeø SV‹ñ‹FƒøWu‹F$ëƒø
u ‹F$ƒÀ,‰Eü‹Müè±Ýÿÿ‹Ø…Û‰]ôt ‹{‹F;Gv‹MüEôPè°Ýÿÿ‹]ô…Ûuâë‹}ô…ÛtD‹F;Gu<W‹Îè=ùÿÿ…Àt‹G@P‹ÏèÒùÿÿ‰Eøë‹MüEôPèoÝÿÿ‹]ô…Ût‹{ÿFƒ}ø t¸ƒ}ø uJ‹MüVSèçåÿÿ‹ø…ÿu ÇEø ë1ÿvÿvÿvhà‹pÿvÿ5h ‹pè " …À‰Eøu‰~(ë ‹MüWè0æÿÿ‹Eø_^[ÉÃÌÌÌÌÌ‹ÿU‹ìVWj h€ @jj j ‹ñh Àÿvÿˆ‹pƒøÿ‰Fu
ÿÌ‹p‹øë3ÿ…ÿua‹FH‹}tHuÿw\ÿvè:( ëÿw\ÿvè( EPh hL‹p‹ÎèXèÿÿ…Àuÿuÿvè' ÿuÿX‹p‹Î‰~$èdþÿÿ‹ø…ÿt‹FƒøÿtPÿØ‹pƒNÿ‰~ ‹Ç_^] ÌÌÌÌÌ‹ÿU‹ìƒìD‹MVEðP¾ Vè¢àÿÿ…À…*
WEüPV3ÿWhˆ‹pÿuðÿT‹p…À…
EìPEøPEôPÿuüè+Ñÿÿ…À…Ü EÜM¼‰}¼‰}؉E܉Eà‰Eäè
Üÿÿ…À…² S3Û9}ôvs‹EìWWWW‰EèEèPÿuøSÿuüÿL‹p…ÀuNj,èµÉÿÿ;ÇYtÿu‹Èè8Óÿÿ‹ðë3ö;÷t.ÿuø‹Îè¦õÿÿƒøuM¼ë;Çu
‹MVè ãÿÿ…Àu ‹Îj
èÅ÷ÿÿC;]ôrM¼èÛÿÿ;ljE[t'EPM¼è(Ûÿÿ‹ð‹Îè>åÿÿ;÷t j
‹Îè÷ÿÿ9}uÙM¼èÖüÿÿÿuüÿX‹pÿuðÿX‹p_^É ÌÌÌÌÌ‹ÿU‹ìSV‹ñ3Û9^Wt9jèôÈÿÿ;ÃYt
ÿ6‹ÈèºÒÿÿ‹øë3ÿ…ÿtÿv‹ÏèÎëÿÿj
‹Ï‹ØèŠÛÿÿëj[è-Òÿÿ…Ûu9ƒ~ÿu3ƒ=h ‹pÿt*ÿvÿuè»Ýÿÿ‹ø…ÿtÿvÿuèwÞÿÿ…Àt
W‹Îè_ýÿÿ‹ØèüÑÿÿ_^‹Ã[] ÌÌÌÌÌ‹ÿU‹ìQ‹MèÚÿÿ…À‰EütJVW‹M‹øEüPè$Úÿÿÿu‹ðÿu‹Îè-ÿÿÿƒøu‹Îè(äÿÿ‹MWè$ãÿÿ…öt j
‹Îènöÿÿ‹Eü…Àuº_^É ÌÌÌÌÌ‹ÿU‹ìƒìVj,èõÇÿÿ3ö;ÆYtH ‰0‰p‰ ‰H$‰H(‰Eüë‰uü9uü„ù ‹MüèÛÙÿÿ…À…Ü EôPh VhP‹ph €ÿT‹p…À…Ç EìPEøPEðPÿuôè¥Îÿÿ…À…" S3Û9uðvzW‹EìVVVV‰EèEèPÿuøSÿuôÿL‹p…ÀuSjèPÇÿÿ;ÆYt
‰p‰p‰p‹øë3ÿ;þt4jEäPÿuøÿÌ‹pƒÄP‹Ïè<Òÿÿ…Àu
‹MüWè6áÿÿ…Àu j
‹ÏèíÙÿÿC;]ðrˆ_ÿuøVÿ5ä ‹pÿ‹p[ÿuôÿX‹pë
‹Müj
è¬ ‰uü‹Eü^ÉÃÌÌÌÌÌ‹ÿU‹ìQQSè·þÿÿ‹Ø…Ût~‹ËèlØÿÿ…À‰EøtjVWEøP‹ËèwØÿÿ‹ð‹Eÿv‹@Pÿ ‹p…Àu?‹Mè:Øÿÿ…À‰Eüt0‹MEüPèFØÿÿ‹øW‹ÎèoÙÿÿ…Àtÿuÿ6ÿwXÿuèÉôÿÿƒ}ü uЃ}ø uš_^Sè©öÿÿ[É ÌÌÌÌÌ‹ÿU‹ìQSèþÿÿ‹Ø…Ût|‹ËèÒ×ÿÿ…À‰EüthVW‹}EüP‹ËèÚ×ÿÿ‹ðW‹ÎèÙÿÿ…ÀtB‹Mè¥×ÿÿ…À‰Et3‹MEPè±×ÿÿÿv‹@Pÿ ‹p…Àuÿuÿ6ÿwXÿuè1ôÿÿƒ
Everything makes sense in someone's mind
|
|
|
|
|
The average user doesn't mess around trying to delete random files in places that are hidden by default (on "noob" settings), either, so what does it matter that an average user wouldn't notice the lack of MZ and "!This program can not be run in DOS mode." etc?
The non-average user is just going to open it with CFF Explorer to see what kind of thing the dll does, which will then explode with an error message on the invalid dll. That is assuming he will come across the dll in some way which is rather unlikely if it's in system32.
Other suggestion - use NTFS alternate data streams
|
|
|
|
|
Now look what you have started.
|
|
|
|
|
Moi?!
|
|
|
|
|
sí señor, usted.
|
|
|
|
|
Impossible since every application that runs does so AS the user that launched it. If the application can read/write the file, so can the user of that application. The two are indistiguishable from each other. When the user launches an app, the app gets a copy of the users security token, therefore, the two are indistinguishable from each other. Also, since a user cannot grant tehemselves more permissions than they already have, neither can the application that is using that users security token.
|
|
|
|
|
Does it have to be on the local file system? Perhaps use a web service to access the file on a remote server. Use encryption if you don't want anybody looking at the data as is crosses the wire. You can use the authentication scheme of your choice to prevent others from accessing the file using the web service.
|
|
|
|
|
|
So you've connected your database now?
|
|
|
|
|
Hi,
Yes Michel I connected to my database thanks to u help.
Can u help me now Michel to complete my project
Thanks
|
|
|
|
|
Sorry, list boxes and check boxes are not really my area . More of a backend and system kinda of person...
Good Luck!
|
|
|
|