adplus-dvertising
frame-decoration

Question

What modifications can be made to a time-stamp verification thread to make it more difficult to remove?

a.

Adding periodical checksum calculations from the main thread that verify the verification thread.

b.

Storing checksums within the code, rather than in some centralized location.

c.

Inlining the actual checksum verifications.

d.

All of the abbove

Posted under Reverse Engineering

Answer: (d).All of the abbove Explanation:The modifications that can be made to a time-stamp verification thread to make it more difficult to remove are adding periodical checksum calculations from the main thread that verify the verification thread, storing checksums within the code, rather than in some centralized location, inlining the actual checksum verifications, and storing a global handle to the verification thread.

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. What modifications can be made to a time-stamp verification thread to make it more difficult to remove?

Similar Questions

Discover Related MCQs

Q. Is the current implementation of the verification thread safe for commercial use?

Q. What changes should be made to the counter constant in a commercial product environment?

Q. What priority should the verification thread be set to in a commercial product environment?

Q. What is the purpose of adding periodical checksum calculations from the main thread?

Q. Why should the actual checksum verifications be inlined?

Q. What should be done with the verification thread in a commercial product environment?

Q. What is the advantage of generating decryption keys in runtime?

Q. What are interdependent keys?

Q. How does Defender use interdependent keys?

Q. What is a cryptographic hash algorithm?

Q. How does Defender generate decryption keys?

Q. What is the purpose of dongle protection?

Q. Why was the Chained Block Cipher in Defender crackable?

Q. What would make cracking Defender more difficult?

Q. What is the disadvantage of user-input-based decryption keys?

Q. Why is generating decryption keys in runtime important?

Q. What is dongle protection?

Q. Why is heavy inlining used in Defender?

Q. Is cracking commercial copy protection mechanisms legal?

Q. What is digital rights management (DRM)?