Who will debug Tianzheng with ollydbg. 300 points are given for the correct answer

Updated on educate 2024-04-09
10 answers
  1. Anonymous users2024-02-07

    Open Tianzheng, OD, and select [Attach].

    bpx getwindowtexta

    f9, back to program airspace.

  2. Anonymous users2024-02-06

    If there is a shell, the shell is removed first.

    After the od is opened, run it and look for the keyword. Or when you run to the password input box, press the K key to find the messagebox to cut off.

    Then find the key jump. At this time, pay attention to the memory information.

  3. Anonymous users2024-02-05

    Correct, return to the user is not ctrl+f9, but alt+f9, and if it is related to the network connection, send recv connect socket breakpoint to analyze it, to hurry.

  4. Anonymous users2024-02-04

    Are you modifying the rest resource? Do you still want to debug the program? If you want to modify the resource attributes in the game, it is recommended that you use CE, OD is not used for this.

  5. Anonymous users2024-02-03

    Generally speaking, there is no need to set up what system your computer is.

  6. Anonymous users2024-02-02

    Copy the project to the corresponding Eclipse, and then modify the Public Static Boolean Access(String Path, AccessRight DesiredAccess) method to return true!

  7. Anonymous users2024-02-01

    Browser games don't have a client, so there's no call, just encryption and decryption.

  8. Anonymous users2024-01-31

    There's no software that can't be broken (it's all a matter of time.) )

    There are only 3 measures for the software that gives crackers a headache:

    1.Itself is well encrypted.

    The cracker has no desire to crack (too tiring).

    2.The software charges are reasonable and the advertising is appropriate.

    People cracker is generally reasonable.

    3.Updates are fast.

    This and the first one are simply invincible... People just broke out.,Your new version has appeared.。。 )

    It's mainly the first type of protection (of course, technology is required.). )

    1.Can + self-validation.

    Automatically detect if the program has been modified (MD5 or C32) (I don't know what programming language lz is, whether it will be written.) )

    2.Packing (virtual shell or strong shell).

    Very effective for novice crackers. It is also useful for the master to delay time.

    3.Write more hidden piles in the program.

    Write a few more at random.,People think the crack is successful.,After the release.。。 Hey..

    It's just a brick to lead the way, if LZ really wants not to be cracked, you still need to learn to crack the so-called knowing yourself and knowing your opponent. (Programming skills also need to be high.) If you really don't have that technology, then just be free software.

    By the way, if you write encryption for 1 minute more, the cracker will break 10 times more (whatever you want.) If people can really break it, don't care, it means that you are a master. It's not easy to cracker.,Specialized in destruction.。。

    I'm tired of typing.

  9. Anonymous users2024-01-30

    Select the part that you have changed, and then right-click and there is a save change, and you can click on that to save, and if the change is not in one place, then select Save all the changes.

  10. Anonymous users2024-01-29

    After the fix is successful, just save the file.

Related questions
15 answers2024-04-09

Oh, the card water will not be blocked, rest assured, I can tell you the specific operation, if not, I can give you another card water software. I hope mine can satisfy you and give it, thank you for your question, I wish you a pleasant visit!

8 answers2024-04-09

First of all, the computer is silent, but sometimes the problem is more complicated, involving both hardware and software problems. Therefore, it is necessary to find out the cause first, see if the software or hardware is malfunctioning, and then prescribe the right medicine for the problem. We must not mess around for unknown reasons, because if we don't do it, the system will be paralyzed, and the trouble will be big. >>>More

9 answers2024-04-09

You can use the name of the e-magazine master this software, it is really easy to use, I have used it for more than half a year, the e-magazine made by this software is very professional, it is also very beautiful, and the operation is also very easy to use, in this software, you can have a lot of design space, such as you can set up the design template - toolbar icon, automatic page turning, shadows between pages, logo, etc., and also support the import of ** pdf, but also support browsing on the computer, mobile phone, tablet, can be published to WeChat, You can really try this software, hehe.

6 answers2024-04-09

Osmanthus sugar porridge recipe details Cuisine and efficacy: Shanghai cuisine Hypertension recipe Hyperlipidemia recipe Arteriosclerosis recipe. >>>More

6 answers2024-04-09

For example, if you have 100 gold coins, search for 100 in the ranger (there will probably be tens of thousands of results) You quit the ranger and throw away a few gold coins (for example, continue to search for 99 ,,,until there is only one or several results). (In order to be easier to modify) Select one by one, and change all to the number of gold coins you want (what is the specific upper limit, even don't know) There are two things to pay attention to One is: you need to modify the second row (what is it, even forget, anyway, it depends on which file you modify the data yourself) There are three gears, 1 is 0-255 (if your data is 0-255, choose this) The second is 0-65535, and the third is how many even forget The second is: >>>More