DonationCoder.com Software > N.A.N.Y. 2009
NANY 2009 Release: PESplash
seedling:
if you tag your exectuable with 'johnny noname 155-345' (if the space allows) and you find it out in 'the wild' without permisssion, then you'll be able to know exactly where the source came from 'i.e. johnny noname 155-345' simple as that. just use the app and see for yourself.
Jibz:
It sounds like a really neat idea .. is it similar in functionality to hydan?
seedling:
It sounds like a really neat idea .. is it similar in functionality to hydan?
-Jibz (December 29, 2008, 02:20 AM)
--- End quote ---
i never heard of this app, but reading a brief overview of their paper, the idea seems a lot the same (and perhaps even better in some aspects). one key difference is that mine does not use a 'set' group of interchangable opcodes, but rather, reads them from a user created ops.dat file. which effectively is used as a key to encode/read what you're trying to hide.
Navigation
[0] Message Index
[*] Previous page
Go to full version