Font Size: a A A

Research And Application Of The Game Plug-and Anti-plug Technology

Posted on:2015-01-24Degree:MasterType:Thesis
Country:ChinaCandidate:H T GaoFull Text:PDF
GTID:2268330428482830Subject:Computer applications
Abstract/Summary:PDF Full Text Request
This article will make plug-game technology and other technologies involved, such as: disassemble, dynamic tracking, debugging, encryption and decryption, and so do a broadly described, analyzed the principle of plug-in technology and implementation, as well as a summary of some of the anti-plug-in technology. Finally, expanding the plug-in technology in practice.This paper mainly usesed Windows as a software platform, but its technical principles apply equally to other platforms. Using C#as the programming language, coding and testing to achieve plug-in "online " compilation. Because the plug-and anti-plug technology involves disassembly of knowledge, knowledge of encryption and decryption, Windows underlying knowledge. Motion simulation technology:including keyboard and mouse simulation modeling techniques. Packet technology:including waylay Sock technology and waylay API technology and other technologies. Not one of the details, so the author just generally elaborate techniques, the authors blog (www.ght.name) article will be used as supplemental in this regard.Paper is divided into five chapters:The first chapter introduces the research background. Focuses on the game plug-and anti-plug status and trends, as well as some related concepts.The second chapter describes the plug-core technology. Including the development of plug-in to use relevant knowledge:disassemble, dynamic tracking, debugging, encryption and decryption, keyboard and mouse simulation modeling techniques, technologies and Sock waylay API technology.The third chapter describes the anti-plug-related technologies. Including encryption, abnormal data detection, players report design verification code, GM patrols and other government intensify the crackdown.The fourth chapter is through the use of the first three chapters of the technology, some of the existing plug-game analysis, the plug-in technology for practice and application.The fifth chapter summarizes, and the expansion of the plug-in technology.
Keywords/Search Tags:plug-in, anti-plug, encryption and decryption, disassemble
PDF Full Text Request
Related items