![]() ![]() Determining whether even one such isomorphic subgraph exists is NP-complete-and therefore finding all such subgraphs (if they exist) is a time-consuming task. In this case any difficulties attending the unauthorized file extraction process may be considered as positive factor.In that unusual case, I would encrypt the files before compiling the installer.The subgraph enumeration problem asks us to find all subgraphs of a target graph that are isomorphic to a given pattern graph. There aren't any advantages except a size increase.:weird: Also originally posted by Ippi While protection is usually provided by program itself, sometimes this function assigned to distribution package. Virtlink 30th March 2003 19:10 UTC Originally posted by Ippi Not every installer always installs all files it contains.I don't see why an installer would contain files that aren't installed. In this case any difficulties attending the unauthorized file extraction process may be considered as positive factor. Virtlink So what use is it to encrypt files which are decrypted and installed without any key or question?While protection is usually provided by program itself, sometimes this function assigned to distribution package. Ippi 30th March 2003 18:54 UTC Joost Verburg File encryption for an installer that installs files is useles.Not every installer always installs all files it contains. Sh0e 28th March 2003 22:08 UTC what you are saying involves altering the structure nsis uses in generating the sfx this involves changing the source and recreating the packages this does not help in decompiling.īut there is a project that is in need of this and i will create what they need no thx to those of you who made scoffing type of comments or discounting the merit in the creation of this. Whether this would be allowed or not could be then left up to the developer generating the NSIS installer, through a directive in the.NSI file or a command-line switch if that is preferred. ![]() To reiterate: this should be quite do-able (depending on exactly how NSIS constructs the files portion of the installer), and would allow NSIS installers to be viewed as 'archives' by virtually any of the many free and commercial archive-viewing programs out there. Note that things are simpler if you are not dealing with (or generating, as I am suggesting here) their Zip64/Deflate64 extensions, and remembering that we are specifically talking about DEFLATE and Windows. RDaneel 28th March 2003 21:52 UTC For anyone interested in how this really works, talks about it from their perspective. I suspect the filenames or more information used by the sfx and then immediately following the above mentioned block is the compressed file data which i already identified earlier. ![]() (how far it is displaced) there will be 4 bytes that represents the size and compression method of a block of compressed data. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2022
Categories |