ATTENTION: You are viewing a page formatted for mobile devices; to view the full web page, click HERE.

Special User Sections > N.A.N.Y. 2009

NANY 2009 Release: PESplash

<< < (2/2)

seedling:
if you tag your exectuable with 'johnny noname 155-345' (if the space allows) and you find it out in 'the wild' without permisssion, then you'll be able to know exactly where the source came from 'i.e. johnny noname 155-345' simple as that. just use the app and see for yourself.

Jibz:
It sounds like a really neat idea .. is it similar in functionality to hydan?

seedling:
It sounds like a really neat idea .. is it similar in functionality to hydan?
-Jibz (December 29, 2008, 02:20 AM)
--- End quote ---

i never heard of this app, but reading a brief overview of their paper, the idea seems a lot the same (and perhaps even better in some aspects).  one key difference is that mine does not use a 'set' group of interchangable opcodes, but rather, reads them from a user created ops.dat file. which effectively is used as a key to encode/read what you're trying to hide.

Navigation

[0] Message Index

[*] Previous page

Go to full version