Current location - Quotes Website - Personality signature - Protection mode of CD encryption
Protection mode of CD encryption
2.2. 1 converter:

This is a device that is usually plugged into a printer port. Early hardware locks only checked whether hardware locks existed during program execution. For the so-called software cracking experts, they can easily crack protection without even having a hardware lock in their hands. As for the latter hardware lock, it should not only check whether the hardware lock exists, but also read data from it for decoding. This protection is effective for the program, but the cost is too high.

Identification mark:

Such as SID (source identification code) or IFPI code. Because the mold factory that produces optical discs, its production equipment, whether it is the master disc or the mold, is given a unique ID, and the optical disc products made by these equipment will also have their ID. In this way, the source of piracy cannot be hidden. Although this way of preventing piracy is too passive, it still has its slight deterrent.

2.2.3 lead-in area:

On the CD-ROM, the input area will be indicated. Generally speaking, the lead-in area records information about the type of optical disk, TOC (track on optical disk), which is as important as the partition table of hard disk. Because the lead-in area does not contain the data that users really need, generally speaking, CD-R will be generated by itself, rather than being modified by users at will. Therefore, once the area contains other important materials for interpretation, and the CD-R cannot make an abnormal lead-in area, illegal copying can be effectively prevented. Unfortunately, this method can't be applied to PC, because the firmware involved in the CD-ROM drive must be added with an interpreter, so it can't be applied to the CD-ROM drive on the market now.

2.2.4 modify the ISO structure:

This method includes hiding directories, oversized files, junk files, etc. Because CD-ROM files have index values that record initial addresses, lengths, attributes, etc. Users can achieve the above effect as long as they are familiar with the file rules of ISO -9660. For example, just modifying the initial address of a file can make the file visible but unable to be copied, which is why such files are called "junk"; The generation of super-large files is the modification of its length by Debug, which is intended to increase the trouble when users want to copy files to the hard disk and reduce the possibility of reverse engineering or debugging programs.

2.2.5 Discontinuous tracks (bad sectors, fingerprints):

This method is similar to the laser drilling protection of floppy disks. The way of discontinuous trajectory is similar to laser drilling in concept, but it is not real laser drilling. The optical disc protected in this way will not only generate 100% reading error information when the optical disc program is copied from one track to another, but also avoid a large number of copies in the mold factory. However, if the files on the CD are copied to the hard disk and then re-burned to the CD, this protection will not work.

At present, many companies have made their own anti-piracy CD products, which can be roughly divided into two categories:

One is TTR, LASERLOCK, Macrovision and C-Dilla. The technology of these companies is to make fingerprints (special tracks and sectors) on optical discs. Of course, their names are naturally different, some are called fingerprints and some are called watermarks. These fingerprints can't be read by recording equipment or master disk equipment, so they don't exist on pirated CDs when they are pirated naturally. Then these fingerprints are judged by the program to judge whether the CD is pirated or not. For TTR's anti-piracy disk, I once copied its files to the hard disk, and then simulated it with a CD-ROM drive software. It still works normally, so its fingerprint contains no information.

The other is Wave Systems, which has established cooperative relations with companies providing CD-r om content and original equipment manufacturers, and bundled CD-ROMs and DVD-ROM with computers. To buy CD-Roms and DVD-ROM, consumers must have an add-on card or a peripheral device combined with a wavelength meter, or a new computer with a wavelength meter installed. Once WaveMeter is registered through WaveNet (the company's trading system), consumers can use the contents on the CD. This method, of course, can effectively prevent piracy, but obviously, its cost is very high, and both software and hardware should be attached. 3. An encryption scheme combined with optical disc format is proposed.

Overview: encryption recording technology

At present, encryption recording technology and related products can be roughly divided into two categories: ① pure software processing; ② Soft and hard combination. Among them, pure software processing can be divided into three categories: directory/file hiding, directory spoofing and third-party software.

The so-called directory/file hiding, its principle was widely known as early as the MS-DOS era-by modifying the directory/file attribute bytes, it was hidden. However, due to the special process of CD burning and the disk reading and writing characteristics of Windows 9X and other systems, the object of this operation becomes a mirror file of the data to be burned, that is, such as. Hint and. Cif used in common combustion tools. In the specific operation, the corresponding attribute byte is analyzed and located by hexadecimal editors such as Ultraedit and Winhex, and it is changed to "04", and then burned after being saved.

The so-called directory cheating is to use the special structure of the mirror file to modify the actual display name of the directory to be kept secret, so that it is inconsistent with the actual operation name, resulting in abnormal file access, giving people the illusion of "disk problem" or "system problem" and confusing others. In addition, this method is usually combined with directory hiding to enhance the confidentiality effect.

The basic method of third-party software encryption is to re-encode or unpack the original data before or at the same time of recording, and put the decryption program in the automatic operation of the CD, so that the original data can be seen only after verifying the password. Otherwise, even if you can browse the CD, you will only see the processed "processed products". As for the specific implementation method, it is "the Eight Immortals cross the sea and show their magical powers." At present, there are many kinds of encrypted recording software on the market, such as CD-protector, SecureBurn, CryptCd and so on.

As for "soft and hard combination", it can be divided into three categories. One is to determine whether the CD information is available by judging the BIOS of the motherboard and setting the encryption point of the hard disk, but this will inevitably reduce the universality of the CD and the practical value of engraving the CD will be greatly reduced. Therefore, this technology is of little significance to ordinary users, and there are few such products on the market.

The other is to use "over-recording". There are two understandings of the so-called "over-recording". One is the recording that exceeds the nominal value, and the nominal value usually refers to the standard values: 74MIN@650MB and 80MIN@700MB. Due to the large diameter and radian of the outer ring of the optical disc, a lot of available physical space is left for recording pits. Therefore, encrypting records on the outer ring and setting encryption information points can not only increase the capacity, but also play the role of encrypting optical discs. Because the over-engraving part is completely carried out on the outer ring of the CD, the pit spacing and depth are not less than the minimum specified in the orange book, so it will not affect the normal reading of the CD-ROM drive in theory; Another understanding refers to the large-capacity optical disc recording that conforms to the provisions of Orange Book 2(CD-R optical disc standard protocol), such as the super-recording function of 90MIN@800MB and 99MIN@870MB. Over-engraving needs the support of burner and software, and also has certain requirements for the quality of CD-R discs.

The third is to make a fuss about the storage form of optical disk data by using a special optical track writing method. This technology is usually used to realize "copy prevention" of optical discs. Many genuine software CDs cannot be copied, even if they are copied, they cannot be used. That's the reason. Typical representatives are: Free Lock, Safedisk, etc. For example, Safedisk mainly realizes "copy prevention" of optical discs by verifying digital signatures and data protection coding.

Below we will introduce several common encryption methods and the corresponding cracking methods in practical application.

Encrypted article: Don't use my CD.

When it comes to CD encryption, you may all know some methods, such as prompting for a password when using a CD, hiding the real path of the source file, and generating a very large file that cannot be copied. , you can make all kinds of encrypted CDs. Let's first look at how to encrypt a CD.

Add a password to the CD.

Adding a password to a CD is the simplest encryption method. When viewing this CD, you must enter the correct password, otherwise you will not be able to browse and use any files in the CD. Because this encryption method is simple to operate, but its security is relatively strong, it is very suitable for novice players.

SecureBurn allows you to add a password to a CD. Its biggest feature is that the CD is password-protected before it is officially burned, and then the CD with password protection can be directly obtained through the built-in burning function of the software.

1.SecureBurn can be downloaded from the website.

Because it uses the same operation mode as the resource manager in Windows, you only need to open the folder in the existing hard disk, find the file to burn, and drag it directly to the CD file list on the right to complete the addition of the burned file.

2. After completing the above steps, click the "Burn" button to burn. However, before the official start of burning, a password confirmation window will appear. You can enter a string of characters as a protection password, and then you can start burning.

Tip: Be sure to select the "SecureBurn CD" check box to create an encrypted CD, otherwise the program will create an ordinary CD without password protection.

3. Anyway, it is very simple to burn an encrypted CD with SecureBurn, and it is also very simple to burn this CD.

After putting the burned CD into the CD-ROM drive, you will see a prompt window as shown in Figure 2. As long as you enter the correct password, you can open the CD file, otherwise you can't read the information inside, so you must remember the password of the CD, otherwise you can only watch it drool.

Tip: When setting a password, it is best not to use your own name, phone number, birthday and other strings that are easily guessed by others. The password should be more than 8 digits to prevent others from cracking it at will.

Make files run only on CDs.

Some friends hope that the encrypted CD cannot be directly copied by others. We can make a CD that others can't copy through CD-Protector.

The working principle of CD-Protector is to add a shell to the executable file, and judge whether there is a corresponding audio track generated after encryption on the CD through this shell. If yes, run it, otherwise refuse to run the CD. Therefore, the CD made by CD-Protector has excellent confidentiality. Not only can others not get the important files in the CD by directly copying files, but even if all the files are copied to the hard disk, they cannot be used. If you want to get the files in the CD, you can only copy the whole CD, so this method is very suitable for encrypting the CD that can only be used after installation, and can also be used for programs that run directly from the CD.

CD-Protector can be downloaded from/down/cdp3setup.exe. Although it is not complicated to make encrypted discs, the program only has encryption function, but does not provide disc burning function. Here we use Nero software to burn CDs.

1. After running CD-Protector, set options such as "File to Encrypted pt", "Custom Message" and "Phantom Trax Directory" in the window shown in Figure 3, and enter a two-digit string from 00 to FF as the encryption key in the "Encryption Key" dialog box.

2. After completing the above settings, click the red "Accept" button. At this point, CD-Protector will encrypt the selected source file. After encryption, you can see that the source file icon has been replaced by the unique logo of CD-Protector, and an additional audio file has been added.

3. Then run the Nero burning program and create a new audio CD, but there are some targeted settings for the program:

① Do not select "Write CD text on CD" in the Audio CD tab.

② Check "Remove the mute at the end of *". "cda tracks" and "Cache tracks on hard disk before burning" in the "CDA Options" tab.

③ Remove the "Complete CD" item from the "Burn" tab.

After completing the above settings, click the "New" button to create a new task, and drag and drop the audio file just made by CD-Protector into the window where the audio track is recorded.

4. After burning, burn the audio file obtained by CD-Protector again according to step 3, that is, burn the same audio file twice in this way. Maybe you will feel strange: why do you want to burn the same file twice? This is because CD-Protector adopts track encryption technology, and determines whether the file can be used by detecting the existence of tracks.

5. Then create a new ISO task in Nero, select "Stratsession Disc" in "Multi-Session", and then drag and drop all files generated by CD-Protector except audio files into the data recording window to start recording. The recording options need to be the same as those set when recording audio tracks.

6. After burning, we get an encrypted CD. At this point, we can view this CD through the "record → view tracks" command in Nero (Figure 7). As you can see here, the same audio file is very different after being burned twice, which is why it needs to be burned twice.

7. Finally, put the encrypted CD into the CD-ROM drive. At this point, the original executable icon has become a unique icon of CD-Protector. Double-click it to run the program normally. However, because the CD-Protector encrypted CD is composed of two audio tracks and one data track, the encrypted executable file in the data track will read the audio track on the CD when it runs, and if it corresponds, it will continue to run, so copying this file to the hard disk will cause an error message. How about, so that the files you store in the CD are safe.

Make personalized encrypted discs.

Through the above operations, we have mastered several common CD encryption methods. Here, I recommend a CD encryption expert who can make personalized encrypted CDs. As an encrypted CD software, CD encryption master can directly modify CD mirror files, such as hiding the directories and files in CD mirror files, turning ordinary files into oversized files, or turning ordinary directories into file directories, so with its help, we can easily make our own personalized encrypted CDs.

The CD encryption master can download it from/gphy/gphynew.exe. Before using it, we need to make important files into CD image files in ISO format in advance, and then encrypt them through the CD encryption master.

After running the CD Encryption Master, click the "Open Image File" button in the toolbar, load the ISO file to be processed, and then you can see the window as shown in figure 17. There are four directories: file directory, hidden directory, normal directory and autorun, and three files: autorun.exe(2GB file), autorun.inf and description.txt Although there are many ways to convert these files, you can easily complete them by selecting the corresponding files and clicking the corresponding button on the toolbar.

1. Hide the directory or file in the CD image.

Select the directory or file to hide, and then click the Hide button. After the image file is burned into a CD, the hidden directory or file will not be visible in the browser.

Note: Do not hide autorun.inf and autorun.inf, otherwise the CD will not run automatically.

2. Turn the file in the CD image into a very large file.

Right-click the file to be enlarged, and select to become a super-large file. When the image file is burned into a CD, it will be displayed as 2GB when viewed from a browser!

Note: Don't turn autorun.inf into a very large file, otherwise there will be errors such as illegal operation. After hiding all the directories and files to be encrypted, or changing the directories into files, click the "Write CD Password" button, then select the password form, the program to be run after password verification, and the CD icon, and enter the password in the CD Password dialog box that pops up (Figure 18). Burn the mirror file into a CD-ROM and verify the password before accessing the hidden directory, hidden file and file directory.

Because the CD encryption master is powerful and easy to use, it is suitable for friends at all levels to encrypt CDs.

For the encryption of optical disc, it needs to be closely combined with the format of optical disc. Using CD format, software encryption and CD format can be effectively combined to realize multiple protection of CD.