Author Topic: patch 1.70 appeared  (Read 1192 times)

Legacy_Dwayne

  • Newbie
  • *
  • Posts: 29
  • Karma: +0/-0
patch 1.70 appeared
« Reply #30 on: November 21, 2012, 04:57:46 am »


               The date above is when the file was created somewhere else if it is a real date. The date my computer lists it being put on my computer is 11-16-2012. My main concern at first was wondering if this came from atari trying to update the messed up (being nice) nwn complete. I tried their forum but it was not working. I may try the file for fun on another computer after Thanksgiving when I have more time. I will let you know what happened if I do it. I wonder if I should report this to Norton? Something failed on their software.
               
               

               
            

Baaleos

  • Administrator
  • Hero Member
  • *****
  • Posts: 1916
  • Karma: +0/-0
patch 1.70 appeared
« Reply #31 on: November 21, 2012, 10:01:51 am »


               

MrZork wrote...

I'm not an expert, but it should be pretty easy to use a wrapper that has a virus infect to a system and then pass execution on to the original binary. But, even if there isn't some hacker's tool that automates creating that wrapper, there's still the problem that running an executable is a risky way to check whether it's infected. By the time the user confirms that the binary isn't doing what one would expect it to, it may have caused all sorts of trouble that's a pain to fix.

I certainly agree that the most straightforward course of action for installing the CP would be to download ShaDoOoW's official release from the Vault and use that instead of any potentially suspect or obsolete file.


Lets not forget the fact that he has scanned it, and it comes back clean.


on side note-
Creating wrappers is easy in .Net Reflection - however, the trade off is that the application that is wrapping the original, needs to be compiled, with enough byte buffer space inside it, to account for the application it is trying to wrap.
eg- the memory cannot be dynamically increased to account for larger executables - unless the application gets rebuilt/compiled.

This means - yes, a 250kb wrapper program, can wrap a 10kb file, or a 100kb file.
But would not be able to wrap a 275kb file.

The other method of virus propagation, is code inject or code caves.
Where some code from the infected application, copies itself into the binary of another -
the problem there however, is making do this in such a way that it doesnt affect the functionality of the target application, and often its a very targetted process, where the injecting application, needs to know the correct memory address to inject to.
               
               

               
            

Legacy_SHOVA

  • Hero Member
  • *****
  • Posts: 893
  • Karma: +0/-0
patch 1.70 appeared
« Reply #32 on: November 21, 2012, 04:19:29 pm »


               

Dwayne wrote...

The date above is when the file was created somewhere else if it is a real date. The date my computer lists it being put on my computer is 11-16-2012. My main concern at first was wondering if this came from atari trying to update the messed up (being nice) nwn complete. I tried their forum but it was not working. I may try the file for fun on another computer after Thanksgiving when I have more time. I will let you know what happened if I do it. I wonder if I should report this to Norton? Something failed on their software.


The patch 1.70 is not an official patch. It was put together by Shadooow, and is his project. He is a member of the community, not a employee of Bio-ware, Atari, or EA. The game is current at 1.69. that is, and was, the last official patch for this game. 
               
               

               
            

Legacy_NWN_baba yaga

  • Hero Member
  • *****
  • Posts: 1944
  • Karma: +0/-0
patch 1.70 appeared
« Reply #33 on: November 22, 2012, 10:13:49 pm »


               Until Trent Oster comes and blitz attacks our hearts with the message... we will do a NWN:enhaced edition YAY:D