Were is T.C. key located on the registry.

English support forum

Moderators: Hacker, petermad, Stefan2, white

User avatar
Leif
Senior Member
Senior Member
Posts: 328
Joined: 2003-02-05, 15:44 UTC
Location: Umeå, Sweden

Post by *Leif »

Mer än tillräckligt!
Get Radio? Sure! - the best Internet Radio Player ever! ;)
User avatar
sas2000
Power Member
Power Member
Posts: 682
Joined: 2003-02-07, 04:32 UTC
Location: Galiza

Post by *sas2000 »

 
Cando o río soa... e que auga leva.
 
User avatar
ts4242
Power Member
Power Member
Posts: 2081
Joined: 2004-02-02, 20:08 UTC
Contact:

Post by *ts4242 »

sas2000 wrote:Which was the reason to develop this feature ?
 
i found this topic in German forum

What i understood is that, this feature provided to fight worms that search for *.key files to steal it (i used an auto translation site to translate this topic)
User avatar
sas2000
Power Member
Power Member
Posts: 682
Joined: 2003-02-07, 04:32 UTC
Location: Galiza

Post by *sas2000 »

 
ts4242 wrote: What i understood is that, this feature provided to fight worms that search for *.key files to steal it
I've read something similar about Winrar rarreg.key.
 
User avatar
Sheepdog
Power Member
Power Member
Posts: 5150
Joined: 2003-12-18, 21:44 UTC
Location: Berlin, Germany
Contact:

Post by *Sheepdog »

ts4242 wrote:
sas2000 wrote:Which was the reason to develop this feature ?
i found this topic in German forum

What i understood is that, this feature provided to fight worms that search for *.key files to steal it (i used an auto translation site to translate this topic)
In this thread Silr Silvia requested to make TC accept any keyname instead of only tcmdkey.zip - for the purpose to confuse worms and key seraching programs. Initially it was introduced much earlier:

TCmd History V6.0 wrote:09.09.03 Added: TC 6.0 now also accepts tcmdkey.zip containing wincmd.key instead of wincmd.key. The key must be stored (no compression) in the file.
sheepdog
"A common mistake that people make when trying to design something
completely foolproof is to underestimate the ingenuity of complete fools."
Douglas Adams
User avatar
Sam_Zen
Power Member
Power Member
Posts: 700
Joined: 2005-02-08, 22:59 UTC
Location: NL
Contact:

Post by *Sam_Zen »

I guess it's always better to have the opportunity to use a custom name in such cases. Default named files or directories are the first targets for malicious robots.
0.618033988
User avatar
sas2000
Power Member
Power Member
Posts: 682
Joined: 2003-02-07, 04:32 UTC
Location: Galiza

Post by *sas2000 »

 
Sam_Zen wrote:I guess it's always better to have the opportunity to use a custom name in such cases. Default named files or directories are the first targets for malicious robots.
I agree totally, that's the problem with key files they're difficult to crack but quite easy to steal.
User avatar
Alextp
Power Member
Power Member
Posts: 2321
Joined: 2004-08-16, 22:35 UTC
Location: Russian Federation
Contact:

Post by *Alextp »

2sas2000
They are very easy to steal.
Here at Moscow I can goto Local Net and find about 20-30 wincmd.key 's.

//I have a legal one!
User avatar
petermad
Power Member
Power Member
Posts: 16021
Joined: 2003-02-05, 20:24 UTC
Location: Denmark
Contact:

Post by *petermad »

I can goto Local Net and find about 20-30 wincmd.key 's.
Why so many - isn't one enough? Or does people prefer different stolen names in the title bar ;-)
License #524 (1994)
Danish Total Commander Translator
TC 11.51 32+64bit on Win XP 32bit & Win 7, 8.1 & 10 (22H2) 64bit, 'Everything' 1.5.0.1391a
TC 3.60b4 on Android 6, 13, 14
TC Extended Menus | TC Languagebar | TC Dark Help | PHSM-Calendar
User avatar
Sheepdog
Power Member
Power Member
Posts: 5150
Joined: 2003-12-18, 21:44 UTC
Location: Berlin, Germany
Contact:

Post by *Sheepdog »

Sam_Zen wrote:I guess it's always better to have the opportunity to use a custom name in such cases. Default named files or directories are the first targets for malicious robots.
It is mentioned in the german thread that it is not very protective to rename the key-file. Because you'll have to define the name and location in Wincdm.ini (or anywhre else) to let TC know the new name. And then it is very easy for malicious programs to use that information to locate the key.

On the other hand the implementation of such a feature implies another possible source of failure.

sheepdog
"A common mistake that people make when trying to design something
completely foolproof is to underestimate the ingenuity of complete fools."
Douglas Adams
User avatar
Sam_Zen
Power Member
Power Member
Posts: 700
Joined: 2005-02-08, 22:59 UTC
Location: NL
Contact:

Post by *Sam_Zen »

2 Sheepdog
Of course you're right. If they really want, they will find it. It's just a way in general to make things a bit more difficult.
0.618033988
User avatar
Alextp
Power Member
Power Member
Posts: 2321
Joined: 2004-08-16, 22:35 UTC
Location: Russian Federation
Contact:

Post by *Alextp »

2petermad
Why so many - isn't one enough? Or does people prefer different stolen names in the title bar
There are not so many different ones - others are duplicates.
Post Reply