InstallShield 隐藏密码输入

* 转载请注明出处 *
* 本文首次发表于: http://www.jiangdu.net/bbs *
* 作者:贾俊 电子邮件:jaron@jdinfo.net *

InstallShield 本身是不自带类型为 Password 的 TextBox 的,如果需要解决此问题,可以参照如下方法:

1、下载一个类似 C++ Resource Editor 的软件,这里我推荐大家用 ExeScope
2、打开_ISRes.dll,这个文件可以在<安装目录>/Redistributable/Compressed Files/0009-English/Intel 32中找到,其中0009-English为语言包,如果你装有中文语言包,可到相应的目录中找到这个文件;
3、在左侧找到 10102 ,编辑对话框样式属性,选中 Password 项。
4、这时可以看到 TextBox 中已显示 ****** 的样式;
5、保存时有一个提示,注意不要改变文件的大小;
6、保存退出;
7、Rebuild 您的工程文件。

由于我有好长时间不用InstallShield和这个工具了,所以上文是我凭印象写的,可能与实际操作过程有些出入,但大同小异,请大家自行测试,修改 _ISRes.dll 前记得备份。

InstallShield PackageForTheWeb Password Cracker (C)thewd@hotmail.com ------------------------------------------------------------------------------ Usage: ISpftw [/longPassword] [/ignoreLength] [/dumpHeaders] target installation that has been distributed using PackageForTheWeb [/longPassword] (PFTW v2.03+) used to attempt recovery of long passwords (28-54 characters) (requires a certain knowledge about the files contained within the cabinet) e.g. cabinet contains test.txt, test1.txt, test2.txt and test3.txt files a) Number Of Files : 4 b) Filenames Length : 45 c) Size Of First File : 4 d) Number Of Chunks : 1 e) Is Compressed? : Yes Notes ===== a) the number of files within the cabinet b) the total length of all the filenames (including directories), i.e. \test.txt \1\test1.txt \2\test2.txt \3\test3.txt = 9 + 12 + 12 + 12 = 45 c) the uncompressed size of the first file in the cabinet (in bytes) d) the number of data chunks used (depends on the size of the files) i.e. once a certain number of bytes have been compressed a new data chuck is created, but this value isn't fixed (depends on source) e) whether the cabinet data has been compressed (usually yes) Even if you don't know all the required information, by looking at the password recovered you may be able to guess the incorrect characters [/ignoreLength] (PFTW v2.03+) ignores the password length determined by this utility, because certain character combinations in the password can return the wrong value [/dumpHeaders] (PFTW v2.03+) dumps the encrypted and decrypted packagefortheweb file headers. Can be used to analyse the length and validity of the password and to determine which characters are invalid ------------------------------------------------------------------------------ Note: Supports InstallShield P
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值