Quote:Original post by RogerThat123Well, you can put extra data at the end of an exectuable and it is just ignored, so the simplest solution would be to write 100 (or so) bytes of random data to the end of the executable. A naive CRC check would change everytime you change that last 100 bytes.
But what are these random areas where you put random junk in?
Can you give me an example?
But that doesn't actually solve the problem, because a hacker will just perform the CRC check on everything but that last 100 bytes.
You can get more tricky with where in the executable you write your random stuff, but where ever you write it, it's basically the same for the hacker - just exclude that area when they do their CRC check.