Were is T.C. key located on the registry.
Moderators: Hacker, petermad, Stefan2, white
i found this topic in German forumsas2000 wrote:Which was the reason to develop this feature ?
What i understood is that, this feature provided to fight worms that search for *.key files to steal it (i used an auto translation site to translate this topic)
In this thread Silr Silvia requested to make TC accept any keyname instead of only tcmdkey.zip - for the purpose to confuse worms and key seraching programs. Initially it was introduced much earlier:ts4242 wrote:i found this topic in German forumsas2000 wrote:Which was the reason to develop this feature ?
What i understood is that, this feature provided to fight worms that search for *.key files to steal it (i used an auto translation site to translate this topic)
sheepdogTCmd History V6.0 wrote:09.09.03 Added: TC 6.0 now also accepts tcmdkey.zip containing wincmd.key instead of wincmd.key. The key must be stored (no compression) in the file.
"A common mistake that people make when trying to design something
completely foolproof is to underestimate the ingenuity of complete fools."
Douglas Adams
completely foolproof is to underestimate the ingenuity of complete fools."
Douglas Adams
Why so many - isn't one enough? Or does people prefer different stolen names in the title barI can goto Local Net and find about 20-30 wincmd.key 's.

License #524 (1994)
Danish Total Commander Translator
TC 11.51 32+64bit on Win XP 32bit & Win 7, 8.1 & 10 (22H2) 64bit, 'Everything' 1.5.0.1391a
TC 3.60b4 on Android 6, 13, 14
TC Extended Menus | TC Languagebar | TC Dark Help | PHSM-Calendar
Danish Total Commander Translator
TC 11.51 32+64bit on Win XP 32bit & Win 7, 8.1 & 10 (22H2) 64bit, 'Everything' 1.5.0.1391a
TC 3.60b4 on Android 6, 13, 14
TC Extended Menus | TC Languagebar | TC Dark Help | PHSM-Calendar
It is mentioned in the german thread that it is not very protective to rename the key-file. Because you'll have to define the name and location in Wincdm.ini (or anywhre else) to let TC know the new name. And then it is very easy for malicious programs to use that information to locate the key.Sam_Zen wrote:I guess it's always better to have the opportunity to use a custom name in such cases. Default named files or directories are the first targets for malicious robots.
On the other hand the implementation of such a feature implies another possible source of failure.
sheepdog
"A common mistake that people make when trying to design something
completely foolproof is to underestimate the ingenuity of complete fools."
Douglas Adams
completely foolproof is to underestimate the ingenuity of complete fools."
Douglas Adams