Posted by Jonathan N. Little on 08/22/06 13:53
Els wrote:
> Jonathan N. Little wrote:
>
>>>> One example I saw recently uses a non-portable method:
>>>> <http://www.printroom.com/popupImage.asp?img_id=42876839&effectRGB=>
>>>> (I haven't figured out exactly how it was done, but it didn't
>>>> matter)
>>> It's stuck in a .dll. There are programs to extract (and compile) .dll
>>> files.
>> Nope is just is just named as a DLL. Rename to 'ViewImage.jpg' and your
>> done!
>
> Didn't think of that one - they could have really stuck it in a .dll
> though :-)
>
>> The do float a transparent GIF over to fool the novice but the
>> bottom line it is not protected!
>
> It never is :-)
>
Obfuscation is pretty effective (like my typing: "The[y] do float...")
It fools countless every day in email attachments to infect their
computers!
--
Take care,
Jonathan
-------------------
LITTLE WORKS STUDIO
http://www.LittleWorksStudio.com
[Back to original message]
|