Web hosting

Monday, April 16, 2018

Dealing with Legacy Applications, Random Stuff, and More

- this post is to help outline some methods for dealing with legacy applications...
- compatibility mode works for a lot of programs but sometimes you don't have a choice but other means
- emulation layers such as Wine, Bochs, DosBox, etc... There has even been talk of emulators for older operating systems (such as DOS and Windows 95/98) out there
- watch for strangeness when using emulation layers. Performance issues, bits and pieces not quite fitting in, etc... Be prepared to have to do some work to make things work properly. Some of the underlying programs can be difficult to use so look out for shell, optimisation type programs and templates...
best settings theme hospital dosbox
dos games on windows 7
theme hospital runs slow in dosbox
Theme Hospital - Bullfrog (1997)
windows 98 emulation layer
9xbox fork of DosBox specifically for Windows.
- try running things in a separate virtual machine
- try running things in a seperate server
- some programs re-used backend data to create a new frontend. Total number of applications that have this done is minimal though. The total number of people who can genuinely reverse engineer binary (even text) file formats and programs out there is relatively small based on what I've seen. Tips on this elsewhere on my blog...
theme hospital on windows 7
- if you're lucky you search for newer version that is still compatible with your operating system. The best way to achieve this is via basic web search. Thankfully, a lot of older/legacy software allows for re-use of serials along the chain
"delphi 3" on "windows 7"
"delphi 4" on "windows 7"
game maker
- if that fails look at P2P locations for file names, etc... Worry about the legitimacy of P2P sites because they may be carrying trojans and/or spyware. If it's your last resort use something like virustotal.com as a bare minimum
torrent delphi
delphi 7 and 2006 code compatibility
- else, you may need to build a custom 'fuzzer'. Conceptually, looking for 200 as opposed to 404 return status. Experience tells me that for the most part file fuzzing is a useless technique especially when the company is 'larger then average'. Larger then average entails more files which entails unique filenames and directory structures which can not be easily guesstimated which means a fuzzer is relatively useless. It needs to be an intelligent fuzzer which combines spidering/crawling capability whenever possible (look over my past work for further details). For anyone just looking to try/test new software before public release this is a nice way of doing it. Sample code is on my website and blog for anyone who's interested (look for crawling and spidering software samples as well)...
web file fuzzer
- you'll need to keep up with updates and services packs for a lot of Microsoft (and some other company's) software even if it may be 'legacy software'. The painful thing is that the updates often only become security updates later on which means you'll lose functional updates down the line at some point. This generally applies to both commercial as well as Free and Open Source (FOSS) software
microsoft sql server desktop engine
sql server 2005 service pack 3
How To Apply the Microsoft® SQL Server® 2005 Service Pack 3
- look for alternate/compatible solutions. For instance Delphi and Open Pascal/Lazarus are very cross compatible based on what I've read online. alternativeto.net is a great website to look at alternate choices
sample code delphi
open source lazarus projects
open source delphi projects
delphi free 2010
visual studio online
- nightmare scenario is when you have the license but have lost the serial number. Thankfully, prior to the world of authentication a lot of software was reliant on pure serial numbers for 'registration' and to move a product from trial to full . In fact, there were serial databases for programs online (such as Serials2K). For those programs whose serials can't be found in such databases they can often be found online. Sometimes, there are methods to extract the code that you used to install your software originally (from the Windows registry or some other file) but this often requires a specialised utility
extract windows 7 serial number
Baixar Delphi 7 + Serial - YouTube
Video for delphi 7 serial number
BLOG : www.phsoft.blogspot.com
Delphi 7 : Serial : 6AMD-PKG68E-DB8PP7-9SFE Key : 3QH-9QW
delphi 7 enterprise serial
Serialkey preview: 6AMD-PKG68E-DB8PP7-N7GE
Key: S6J-8AW
- for certain software you don't really have a choice but to deal with crackers since activation/registration systems are no longer online. Multiple types of bypassing: debuggers, crackers (similar to the devices that you see in the movies that are used to bypass physical security systems. See my book on 'Cloud and Internet Security' for further details regarding this), etc... I may supply code for a simplistic 'cracker' later on but fundamentally it's not that much different then some of the 'bot code' that I have mentioned elsewhere on my blog (it will be so rudimentary that it will be effectively useless. Most modern registration systems rely on activation schemes now or else multi layers of serial numbers which are unrealistic to crack for most people without some 'genuine hard work')
algorithm iterating serial alphanumeric
java password cracker
find serial ollydbg
delphi password cracker
- there are obviously interesting methods to protect/defend software against licensing/registration 'attacks'. Activation is obvious but I've often seen cases where they've had no choice but to drop it because it caused more problems then it fixed
visual studio 2005 activation crack
1. Check license repeatedly
2. Use multiple licensing checking layers
3. Use encrypted dlls
4. Check for the hash of your exe/dll to detect tampering
5. Do not display failures immediately
6. Don't use explicit error messages
7. Crash or fail or output incorrect results when license check fails
8. Embed user information in generated licenses
- go after newer downloads that are compatible with your files and Operating System. Like I said you can do a search, use/build a custom fuzzer, etc... you should be able to find something useful especially if the program registration system is still compatible with your version. Note, Multi-National and Trans-national companies (MNC/TNC) have this problem as well as smaller firms (they rarely ever look to see whether a user has been authenticated prior to allowing downloads)...
search based on MD5 checksum
ID: 30352, Delphi and C++Builder 10 Seattle ISO
download delphi
"delphi 2006" download url
"delphi 2010" download url
Delphi 2010 and C++Builder 2010 ISO
[   ] BDS2006Disk1.iso  540.24Mb  October 8 2010 at 05:28
[   ] BDS2006Disk2.iso  494.24Mb  October 8 2010 at 05:28
[   ] BDS2006Disk3.iso  517.60Mb  October 8 2010 at 05:28
[   ] BDS2006Disk4.iso  224.03Mb  October 8 2010 at 05:28
[TXT] md5-суммы.txt  194.00b  October 8 2010 at 05:18
HTTP/1.1 200 OK
Server: Apache
ETag: "0b4c1e5542dd7cc169e5d85044a9cb33:1363822171"
Last-Modified: Wed, 20 Mar 2013 23:16:38 GMT
Accept-Ranges: bytes
Content-Length: 2021038080
Content-Type: application/octet-stream
Date: Sun, 08 Apr 2018 08:50:00 GMT
Connection: keep-alive
delphi 2006 iso
- company mergers aren't necessarily a bad thing. Most of the time they just change domains but not file naming and directory structure when they 'switch servers'
- if you can't actually get a copy of the legacy software in question online then try op-shops, specialist software boutiques, retailers, libraries, user/enthusiast groups, organisations which are likely to have a 'spare legacy copy', etc... If not too difficult then try building something from the outset by yourself that is compatible (requires 'reverse engineering' skills though as mentioned above)
- as an aside, if you've worked in this are you'll realise that there is basically no such as thing as genuine 'computer security'. There's only more and less security? It's much easier to attack then defend. When someone tells you that they can break into a system it's not much a statement if you understand the defender's perspective. Most of the people you see/hear about (even professionals) aren't genuine 'security experts' in the way that the average person is taught. Listen to a lot of their debates and lectures and it becomes obvious that a lot of their work is not that much different from a variation from a lot of the scripts that I use on this blog/website?
The Big Security Debate - Sydney Edition

Random Stuff:
- as usual thanks to all of the individuals and groups who purchase and use my goods and services
- latest in science and technology
usb graphics for crypto mining
usb graphics card mining 
Windows Mobile for Government - Common Criteria certification
cheat theme hospital reputation
- latest in finance and politics
- latest in defense and intelligence
- latest in animal news
- latest in music and entertainment

Random Quotes:
- Pogue claims the report also shatters another common perception of cyber security, “that of the teenage hacker living in a basement”.

The report found that three-quarters of respondents were college graduates and nearly one-third (32%) had post-graduate degrees. The majority (57%) worked for medium-sized, large, or enterprise businesses.

“When organisations develop their cyber security strategies, they may have IT, legal, risk, and human resources teams at the table but the one person they never invite is the bad guy,” Pogue said. “It’s no wonder that so many security strategies are misdirected.

“The Nuix Black Report 2018 is an opportunity to bring the adversary to the table and have the hackers themselves tell you what’s most effective for your security efforts.”
- These results suggest the Iron Dome debate has been too polarized. The system’s initial value may have been largely symbolic. But it later become very influential.

That’s good news for Israel and its American funder. It’s also reassuring for potential Iron Dome buyers facing missile threats in other parts of the world.

Only Azerbaijan has purchased any systems so far. But the U.S. Army may buy some for short-range air defence. (Canada only bought the radar.)

However, the system isn’t “the end of rockets.” Attackers can counter interceptors by firing rockets in large batches. Indeed, Israel’s opponents keep acquiring more rockets. Hamas in strife-filled Gaza reportedly has 10,000. Hezbollah in Lebanon has 120,000. That latter arsenal would severely strain Israeli interceptors during any future “Northern War.”

Similarly, sophisticated attackers use technology to make their missiles hard to intercept. In their Syria strike, America and its allies used difficult-to-detect cruise missiles. Defenders can’t intercept what their radars can’t see.

Quick Beef Stew Recipe, Random Stuff, and More

This is the latest in my series on quick, easy, and tasty meals:   http://dtbnguyen.blogspot.com/2017/11/chinese-style-congee-jook-recipe...