Quote:Original post by Anonymous PosterQuote:Original post by Toolmaker
... but the game seems to quit when another process writes to memory.
...
This is also something you sohuld look for. Processes that are attached your client or trying to write to it's memory. I think there's a way to enumarate all attached processes.
Toolmaker
Complete, total, and utter waste of time. This was proved pointless approximately 7 years ago when Diablo was hacked using ?softICE? and live memory debugging. If someone has the time/inclination/energy to try hacking like that, they'll sooner or later find softICE and friends.
Here's the hacker solution (you can pass on to your friend if you like)
1. Find the memory you want to change
2. Change it
3. Step through the program letting it "discover" the interference
4. Identify the code that did the discovery
5. Disable it.
6. Go back to 1-2, and this time you won't be stopped
...or variations on that, depending on how many checks the program does. In general, someone who writes self-protecting code doesn't really understand basic security theory and probably ought to get a different job doing something they're competent at instead.
There are things that are worth doing just to slow down the hackers, but for any successful game you just want to either protect it, or not - this half-arsed crap just increases development time (+cost) without making the game any more secure.
redmilamber
You just proved yourself deaf. As just stated, Maple has specific guards that allow it to shutdown immediately upon the detection of a debugger trying to attach itself (yes, there is currently one way around this, which requires windows 98 compatiblity mode and a special VxD, but it can be fixed). It has both general purpose detection (it can detect any generic unknown debugger attaching, and can detect memory changes [it is possible to read so long as not set remote write mode in virtualProtect], and is filled with a list of known debuggers and hacking tools that will cause it to shutdown before any of the above even happens [as with most anti-hacking code, softice is at the top of the list for software to detect]).
Your post makes it sound like you are an amateur who has probably never even seen SoftIce in action, and are simply refering some kind of mythical version of SoftIce that you've hear about. But then that may not be true, you simply make it sound that way by not knowing much at all about what you are talking about.