home *** CD-ROM | disk | FTP | other *** search
- Path: dispatch.news.demon.net!demon!westridg.demon.co.uk
- From: Jon A Barrett <jbarrett@westridg.demon.co.uk>
- Newsgroups: comp.lang.c
- Subject: Re: Can Windows DLL identify caller?
- Date: Wed, 28 Feb 96 08:32:18 PDT
- Message-ID: <NEWTNews.825525896.14201.jbarrett@westridg.demon.co.uk>
- References: <NEWTNews.825272087.8651.jbarrett@westridg.demon.co.uk> <4gr0bcINNjv2@keats.ugrad.cs.ubc.ca>
- NNTP-Posting-Host: westridg.demon.co.uk
- X-NNTP-Posting-Host: westridg.demon.co.uk
- X-Newsreader: NEWTNews & Chameleon -- TCP/IP for MS Windows from NetManage
- MIME-Version: 1.0
- Content-Type: TEXT/PLAIN; charset=US-ASCII
-
-
- In article <4gr0bcINNjv2@keats.ugrad.cs.ubc.ca>, <c2a192@ugrad.cs.ubc.ca>
- writes:
- > Path:
- news.demon.co.uk!dispatch.news.demon.net!demon!tank.news.pipex.net!pipex!uunet!
- in2.uu.net!istar.net!news1.vancouver.istar.net!news.vancouver.istar.net!van-bc!
- unixg.ubc.ca!nntp.cs.ubc.ca!cs.ubc.ca!keats.ugrad.cs.ubc.ca!not-for-mail
- > From: c2a192@ugrad.cs.ubc.ca (Kazimir Kylheku)
- > Newsgroups: comp.lang.c
- > Subject: Re: Can Windows DLL identify caller?
-
- <-Stuff Deleted->
-
- >
- > Also, note well: A shared library (or DLL, if you will) cannot really be
- > trusted to protect sensitive information. It is not a protection domain. To
- > >Any clues would be gratefully received.
-
- <-Stuff Deleted->
-
- >
- > You definitely need to get some. The platform you are using may itself be
- > inappropriate to what you are trying to do, as well as the overall approach.
- > I can't tell---the term DLL is used not only under Windows but elsewhere.
- > --
-
- Thanks for your response, and thankyou especially to other respondents who
- sent very helpful clues by mail. I have now completed this module and have
- moved on. In repsonse to specific points, The platform is MS-Windows which
- could never be considered a secure platform, this paricular DLL actually
- performs a decryption service (yes I do know that truly secure systems do have
- a decryption service) and therefore the data isn't actually 'in memory' until
- the call is made, the project goal is only to make it pretty tricky to crack,
- not hacker proof - it is not protecting the Holy Grail or the formula for Coke
- :-)
-
- JonB
-
-
-
-