It is not static, will have an absolute synchronization since the launch of the application until the injection of code ...
It's a milisseconds class, until SLUI invoke the kernel and is standing right on top of the function ...
EDIT: No one ever saw that post. Have any of you three compiled JC's new method into an application yet?
Disassemble without permission generate instantly punish with this forum, per disrespect to others developers ; And I doubt you can see some code with "Reflector", anemeros has a hard encryption on your developments from the beginning ...
Oh, hmm, I guess your right. Well, I tried. Have you guys got any further with the new activation method?
Code: using (var user = WindowsIdentity.GetCurrent()) { //Take ownership of the directory var dOwnership = new DirectorySecurity(); dOwnership.SetOwner(user.User); Directory.SetAccessControl("C:/Windows/System32", dOwnership); //Get access to the directory. var dAccess = new DirectorySecurity(); dAccess.AddAccessRule(new FileSystemAccessRule(user.User, FileSystemRights.FullControl, AccessControlType.Allow)); Directory.SetAccessControl("C:/Windows/System32", dAccess); } I advise the use of the Icacls and Takeownership for the ACL Replacement ; Or use try / catch arguments for not crashing the app if occurs any error ...
The ACL Replacement is useful on hacked OS with ACL Mods in the Tokens ; I use the Advanced ACL replacement, restoring the original permissions for Tokens file on Backup / Restore with total success without moding the original ACL's, before it, checks if tokens is in use or access to file is denied asking for restart if this occurs
Yeah, if tokens is moded, the ACL's isn't the same ; If tokens is denied by ACL, the copy C# method fails and not restore the activation with risk of brick the activation system temporarily ; If tokens is hidden, independently of the ACL, the copy also fails ; I've implanted the auto-checksum for tokens before start backup / restore for security reasons ...
I've tested, the SPPSVC and OSPPSVC start / stop doesn't restore the original tokens ACL if the same is Moded / Hacked / Replaced / Denied: If you use this method for restore permissions for files ... This is the ACL Restore module on the Denied Tokens here:
Ah, lol, the tokens restore only is working for Windows, more, not work for Office, I've used this on my video demonstration: This is video is tested with MAK key, With BBBBB serial detected, the restore most success on the tests, the Key backup for Windows is not needed in my tests with OEM / Retail / MAK, I reserve the ProductKey Backup also, for any security ...