14/10/2009, 05:48 PM
14/10/2009, 05:50 PM
You wrote a keygen? lul.
14/10/2009, 05:55 PM
I feel like my life has meaning now.... n.n
Anyways, this took many hours and I feel like ramming my computer into a compost compactor but it works quite well.
Anyways, this took many hours and I feel like ramming my computer into a compost compactor but it works quite well.
14/10/2009, 05:58 PM
The GUI part is basic, but how did you get it to actually generate a key?
14/10/2009, 06:06 PM
Sweet! you coded your own keygen?
14/10/2009, 06:17 PM
@ Mickey. Yep. n.n
Like I said, it takes forever. :-\
@ Tactical: I wanted it basic for many reasons. The more graphics the higher the file size. This one keygen was 18 mb until I made the BG a JPEG and lowered the quality of the music.
The coding for the program takes a working key(s) and makes an algorithm. It then randmoizes the key so that it is an acceptable one for the program.
Like I said, it takes forever. :-\
@ Tactical: I wanted it basic for many reasons. The more graphics the higher the file size. This one keygen was 18 mb until I made the BG a JPEG and lowered the quality of the music.
Quote:The author of a keygen typically uses a disassembler to look at the raw assembly code of the targeted program, checking either the software itself or the installer. Once access has been obtained to the program's code, the location of the subroutine(s) responsible for verifying that the key entered is valid are found. Using this knowledge, the algorithm may be reverse engineered to generate valid keys, which is then incorporated into the keygen.
With weaker serial protection schemes a complex reverse is not required as the key-checking code itself in the original application can be effectively copied and incorporated into a keygen. Weaker schemes sometimes internally generate a correct key inside the original application for comparison purposes (to determine whether the entered key is correct).
Some keygens use a brute force approach or brute force hybrid approach to creating valid keys. In these instances, rather than produce an exact reverse of the key check algorithm, the attacker uses a search technique, testing many possible combinations per second against the key validation check until a given combination produces a valid key.
Sometimes keygens have code incorporated into the keygen to change the written code of a program in order for the code that is given via the keygen to work, but this is not typically done for a keygen, as it is considered 'impure' when a crack must be used in conjunction with a keygen; true keygens are considered as such when they generate valid keys and do not require an additional 'crack' i.e. modification to the original application code for generated keys to be accepted.
The coding for the program takes a working key(s) and makes an algorithm. It then randmoizes the key so that it is an acceptable one for the program.
14/10/2009, 06:28 PM
oh I wasn't say it looks basic, I meant coding that part is basic.
and wow, you're a beast.
care to share it. ;)
and wow, you're a beast.
care to share it. ;)
14/10/2009, 06:29 PM
Get me on MSN or Skype, desu.
adamshedd@hotmail.com
joomla12
Not necessarily. The actual keygen I made with Visual Basic and C. The algorithm I found with a hex editor and EXE decompiler.
adamshedd@hotmail.com
joomla12
Xitherun Wrote:oh I wasn't say it looks basic, I meant coding that part is basic.
Not necessarily. The actual keygen I made with Visual Basic and C. The algorithm I found with a hex editor and EXE decompiler.
14/10/2009, 06:32 PM
mehhhhhhhhh. I don't have Pidgin installed, and I'm far too lazy to right now.
oh, but I just remembered I do have Skype.
oh, but I just remembered I do have Skype.
14/10/2009, 06:35 PM
Well hurreh.....