in reply to video & license keys

I'm sorry that I don't know how to do this. However, not that this is of any help to your friend now, but if he cares about the integrity of his files, he should use something more robust than checking to see if the file requires a license key. Storing MD5 hashes of the files on read-only media, Tripwire that runs and logs to another computer, etc. I mean, who's to say that the hacker didn't replace his files with other files that require a license key? That would defeat the check that you're trying to perform, but would leave hacked files in place of the good ones...

thor

Feel the white light, the light within
Be your own disciple, fan the sparks of will
For all of us waiting, your kingdom will come

Replies are listed 'Best First'.
Re^2: video & license keys
by jfroebe (Parson) on Dec 31, 2004 at 19:01 UTC

    I agree.. but md5 hashes of the files weren't done prior to the hack. My task is simply to verify that the license requirement is in each file (there are many many different licenses due to the many sources of the files).

    basically detailed requirement is:

  • identify files without license requirements
  • verify the license requirement metadata
  • Now, if I can determine if the file requires a key, then I'm nearly done. Racking my brain on this one :-(

    Jason L. Froebe

    Team Sybase member

    No one has seen what you have seen, and until that happens, we're all going to think that you're nuts. - Jack O'Neil, Stargate SG-1

      All I'm saying is that those who don't learn from experience are doomed to repeat the same mistakes over and over. Your friend has an opportunity here to, once he's verified that all the files are correct, to impliment some sort of signature on the files. That way, should this situation arise again, it's as simple as verifying the signature against the file.

      thor

      Feel the white light, the light within
      Be your own disciple, fan the sparks of will
      For all of us waiting, your kingdom will come

        Yup, I totally agree with you on this :-) She told me that she inherited the problem system and was writing up a proposal for just that when the site was broken into.

        Team Sybase member

        No one has seen what you have seen, and until that happens, we're all going to think that you're nuts. - Jack O'Neil, Stargate SG-1