Welcome guest. Before posting on our computer help forum, you must register. Click here it's easy and free.

Author Topic: how to add characters in this message ~Ex.) ("")  (Read 9369 times)

0 Members and 1 Guest are viewing this topic.

zask

    Topic Starter


    Intermediate

    • Experience: Experienced
    • OS: Other
    how to add characters in this message ~Ex.) ("")
    « on: January 11, 2016, 08:41:26 PM »
    i want to make a simple output like this

    echo |Del *.*

    except i want to add ("") around it

    for example it's output displays.

    C:\Users\Username\Desktop\*.*, Are you sure (Y/N)?

    what it does is answers the DEL "Are you sure" question automatically.

    i would like to change it's output message to

    C:\Users\Username\Desktop\*.*," Are you sure (Y/N)?"

    thanks

    Geek-9pm


      Mastermind
    • Geek After Dark
    • Thanked: 1026
      • Gekk9pm bnlog
    • Certifications: List
    • Computer: Specs
    • Experience: Expert
    • OS: Windows 10
    Re: how to add characters in this message ~Ex.) ("")
    « Reply #1 on: January 11, 2016, 11:27:45 PM »
    So far it makes no sense.
    Do you understand the DEL options in Windows?
    Code: [Select]
    Microsoft Windows XP [Version 5.1.2600]
    (C) Copyright 1985-2001 Microsoft Corp.

    C:\Documents and Settings\User>help del
    Deletes one or more files.

    DEL [/P] [/F] [/S] [/Q] [/A[[:]attributes]] names
    ERASE [/P] [/F] [/S] [/Q] [/A[[:]attributes]] names

      names         Specifies a list of one or more files or directories.
                    Wildcards may be used to delete multiple files. If a
                    directory is specified, all files within the directory
                    will be deleted.

      /P            Prompts for confirmation before deleting each file.
      /F            Force deleting of read-only files.
      /S            Delete specified files from all subdirectories.
      /Q            Quiet mode, do not ask if ok to delete on global wildcard
      /A            Selects files to delete based on attributes
      attributes    R  Read-only files            S  System files
                    H  Hidden files               A  Files ready for archiving
                    -  Prefix meaning not

    If Command Extensions are enabled DEL and ERASE change as follows:

    The display semantics of the /S switch are reversed in that it shows
    you only the files that are deleted, not the ones it could not find.

    C:\Documents and Settings\User>
    The are are enough options to do nearly anything you want.
    So, what do you want?

    zask

      Topic Starter


      Intermediate

      • Experience: Experienced
      • OS: Other
      Re: how to add characters in this message ~Ex.) ("")
      « Reply #2 on: January 11, 2016, 11:41:05 PM »
      I just simply just want to add quotation marks around the output of the command

      echo |Del *.*

      the output displays this

      Are you sure (Y/N)?

      im trying to get it to do this

      "Are you sure (Y/N)?"

      thank you...

      foxidrive



        Specialist
      • Thanked: 268
      • Experience: Experienced
      • OS: Windows 8
      Re: how to add characters in this message ~Ex.) ("")
      « Reply #3 on: January 12, 2016, 03:44:08 AM »
      This is like your other thread zask - you're not describing what you actually want to do.

      If you want to add double quotes in that situation then describe why you want to do so.


      Without that information it seems too much like a pointless question which is designed to get information about a different task - and those questions often end up wasting the time of the volunteers...

      zask

        Topic Starter


        Intermediate

        • Experience: Experienced
        • OS: Other
        Re: how to add characters in this message ~Ex.) ("")
        « Reply #4 on: January 16, 2016, 04:34:48 PM »
        My bad
        « Last Edit: January 16, 2016, 04:56:24 PM by zask »

        zask

          Topic Starter


          Intermediate

          • Experience: Experienced
          • OS: Other
          Re: how to add characters in this message ~Ex.) ("")
          « Reply #5 on: January 16, 2016, 04:41:35 PM »
          This is what im trying to do. it just doesn't look right without quotation marks.

          I have a List of command that i am using that all have quotation marks around there outputs.

          @echo off
          echo This is "%%CD%%" which displays "%CD%" 
          echo and expands to the drive letter and path of the current directory.
          echo.
          echo This is "%%~DP0" which displays "%~DP0"
          echo and expands to the drive letter and path in which that batch file is located.
          echo.
          echo This is "%%~N0%%~X0" which displays "%~N0%~X0"
          echo and which is used to copy the current file to another directory.
          echo.
          echo This is "%%RANDOM%%" which displays this "%RANDOM%"
          echo and which is a variable that captures a somewhat random five digit number.
          echo.
          echo This is "%%ALLUSERSPROFILE%%" which displays this "%ALLUSERSPROFILE%"
          echo which also displays the Current Programs data folder.
          echo.
          echo This is "%%SYSTEMROOT%%" whish displays "%SYSTEMROOT%"
          echo which also displays the current location of the Windows foler.
          echo.
          echo This is "%%APPDATA%%" which displays "%APPDATA%"
          echo which displays the current location of the Appdata/roaming folder.
          echo.
          echo This is "%%CD%%" which displays "%CD%"
          echo which displays the current location of the Desktop
          echo.
          echo This is "%%PATH%%" which displays "%PATH%"
          echo which specifys a set of directories where executable programs are located
          echo.
          echo This is "%%TEMP%%" which displays "%TEMP%"
          echo which displays the current location of temp directory.
          echo.
          echo This is "%%DATE%%" which displays "%DATE%",
          echo which gives you the date.
          echo.
          echo This is "%%TIME%%" which displays "%TIME%",
          echo which gives you the time.
          echo.
          echo This is "echo |Del *.*" which displays
          echo |Del *.*

          But for the love that all is living I cant get quotation marks around the output of this last message.
          « Last Edit: January 16, 2016, 04:53:17 PM by zask »

          foxidrive



            Specialist
          • Thanked: 268
          • Experience: Experienced
          • OS: Windows 8
          Re: how to add characters in this message ~Ex.) ("")
          « Reply #6 on: January 18, 2016, 08:09:21 AM »
          I get this display with your code.  I'm still not clear what you are doing.

          Code: [Select]
          c:\>echo This is "echo |Del *.*" which displays
          This is "echo |Del *.*" which displays

          DaveLembke



            Sage
          • Thanked: 662
          • Certifications: List
          • Computer: Specs
          • Experience: Expert
          • OS: Windows 10
          Re: how to add characters in this message ~Ex.) ("")
          « Reply #7 on: January 18, 2016, 09:21:48 AM »
          Wondering if they are running into an issue with lack of escape character  :-\

          http://www.robvanderwoude.com/escapechars.php

          patio

          • Moderator


          • Genius
          • Maud' Dib
          • Thanked: 1769
            • Yes
          • Experience: Beginner
          • OS: Windows 7
          Re: how to add characters in this message ~Ex.) ("")
          « Reply #8 on: January 18, 2016, 09:47:50 AM »
          His wounds are generally self-inflicted...
          " Anyone who goes to a psychiatrist should have his head examined. "

          zask

            Topic Starter


            Intermediate

            • Experience: Experienced
            • OS: Other
            Re: how to add characters in this message ~Ex.) ("")
            « Reply #9 on: January 18, 2016, 05:58:00 PM »
            I get this display with your code.  I'm still not clear what you are doing.

            Code: [Select]
            c:\>echo This is "echo |Del *.*" which displays
            This is "echo |Del *.*" which displays

            i am creating a simple batch file that explains certain commands, every command i have has quotations added to it, but if i add quotations to the last command they will not display the output of the command, i want to be able to display the output of the command with quotes without the command not displaying it's output.

            BC_Programmer


              Mastermind
            • Typing is no substitute for thinking.
            • Thanked: 1140
              • Yes
              • Yes
              • BC-Programming.com
            • Certifications: List
            • Computer: Specs
            • Experience: Beginner
            • OS: Windows 11
            Re: how to add characters in this message ~Ex.) ("")
            « Reply #10 on: January 18, 2016, 10:14:36 PM »
            If you want to display the output of a command, you have to run it.

            Don't run "Del *.*" arbitrarily, please.

            Besides- Del *.* outputs a prompt requiring Y or N.
            I was trying to dereference Null Pointers before it was cool.

            foxidrive



              Specialist
            • Thanked: 268
            • Experience: Experienced
            • OS: Windows 8
            Re: how to add characters in this message ~Ex.) ("")
            « Reply #11 on: January 19, 2016, 05:30:22 AM »
            i am creating a simple batch file that explains certain commands

            :)

            zask

              Topic Starter


              Intermediate

              • Experience: Experienced
              • OS: Other
              Re: how to add characters in this message ~Ex.) ("")
              « Reply #12 on: January 19, 2016, 09:51:44 PM »
              Patio you had no reason to close my last topic, all i had done was ask for a rating on my encrypted code and you started calling me a lier, telling me what i was using is pointless and saying that it is not encryption, you constantly say that your being patient but when i even give proof that my code if encrypted you locked it without even giving me a chance. It was not at all a malicious file. you didn't even try to use it in a bat file to see if it would even work you just constantly said that my information was incorrect. your mad because i proved you wrong. i used polymorphism which is a form of encryption that would commonly be used by viruses to avoid antivarus detection. but my file contained 0 viruses, worms, trojan or anything. it was just encrypted but you was to stubborn to take 5 seconds of your time copy and paste it into a batch flle and see if it would do anything. you just looked at it, clamed it a as bunch of garbage and starting telling me that it doesn't even work when ive ran and tested the program with 100% zero errors. please give me a logical reason of why you do that.
              If you will just try to see if it works then you would stop telling me that im wrong because im not, your just to suborn to get proved wrong

              Geek-9pm


                Mastermind
              • Geek After Dark
              • Thanked: 1026
                • Gekk9pm bnlog
              • Certifications: List
              • Computer: Specs
              • Experience: Expert
              • OS: Windows 10
              Re: how to add characters in this message ~Ex.) ("")
              « Reply #13 on: January 19, 2016, 10:10:59 PM »
              Zack, this forum is not a debate teram.

              If you are really deep into programming you would go to some place like stackoverflow. But I doubt they would tolerate your ranting.

              What was your question?  You need to add quotation marks to a string?
              Why is that so hard?
              If you have a list of strings , you can easily add a quote at the start and finish of each line. And there are other methods. The issue is trying to understand what your are thinking.  ???

              Again your issue is not explaining clearly and concisely what you need.

              zask

                Topic Starter


                Intermediate

                • Experience: Experienced
                • OS: Other
                Re: how to add characters in this message ~Ex.) ("")
                « Reply #14 on: January 19, 2016, 10:18:31 PM »
                i wasn't ranting he was constantly saying that my code wouldn't even work because it isn't even code, he was telling me that it wasn't encrypted and i even send him a link to proof that my type of code was a form of encryption. I told him it was a form of encryption called polymorphism. he blocked my page for no reason. i don't understand how he can say that something doesn't work, but wont even give 5 seconds of there time to test and see if it actually worked. I dont want no debate, im literally being called an idiot because he cant find the patience to even copy and paste a script of code. to back his source of telling me that my file doesn't work. it's his nonsense! he was the one who bringed al
                l the chaos
                 

                foxidrive



                  Specialist
                • Thanked: 268
                • Experience: Experienced
                • OS: Windows 8
                Re: how to add characters in this message ~Ex.) ("")
                « Reply #15 on: January 20, 2016, 12:44:42 AM »
                im literally being called an idiot
                Many of us here are a good deal older than you, but we were your age once. You've told us your age.

                We understand how young people often have the viewpoint that their knowledge is infallible - because we were like that when we were young too.  You will realise in time that many things you don't understand will affect what you think you do understand - and you'll learn more and more as you grow older just how much you don't know.

                 If someone literally called you an idiot then you would see that written on the page.
                That is what the word 'literal' means.

                You are rather argumentative though, and don't respond to the comments that you fabricate nonsense about what you want to do.

                BC_Programmer


                  Mastermind
                • Typing is no substitute for thinking.
                • Thanked: 1140
                  • Yes
                  • Yes
                  • BC-Programming.com
                • Certifications: List
                • Computer: Specs
                • Experience: Beginner
                • OS: Windows 11
                Re: how to add characters in this message ~Ex.) ("")
                « Reply #16 on: January 20, 2016, 12:48:41 AM »
                Why is Patio getting my credit?
                I was trying to dereference Null Pointers before it was cool.

                Geek-9pm


                  Mastermind
                • Geek After Dark
                • Thanked: 1026
                  • Gekk9pm bnlog
                • Certifications: List
                • Computer: Specs
                • Experience: Expert
                • OS: Windows 10
                Re: how to add characters in this message ~Ex.) ("")
                « Reply #17 on: January 20, 2016, 08:13:16 AM »
                Quote
                l the chaos
                and
                Quote
                Re: how to add characters in this message ~Ex.) ("")

                To avoid chaos, let's stcik to just one topic.
                You want to add chars to a string that is the output of some command. Is that right?
                In early versions of DOS you can use an alternative command interpreter. I do not know if that works ion present versions of Windows. One could patch a copy of the command.com file and rename it to command.2.com and ten use the comspec feature to make it the default interpreter.
                So you wish to explore this? (It has already been done elsewhere.)


                patio

                • Moderator


                • Genius
                • Maud' Dib
                • Thanked: 1769
                  • Yes
                • Experience: Beginner
                • OS: Windows 7
                Re: how to add characters in this message ~Ex.) ("")
                « Reply #18 on: January 20, 2016, 08:56:23 AM »
                Patio you had no reason to close my last topic, all i had done was ask for a rating on my encrypted code and you started calling me a lier, telling me what i was using is pointless and saying that it is not encryption, you constantly say that your being patient but when i even give proof that my code if encrypted you locked it without even giving me a chance. It was not at all a malicious file. you didn't even try to use it in a bat file to see if it would even work you just constantly said that my information was incorrect. your mad because i proved you wrong. i used polymorphism which is a form of encryption that would commonly be used by viruses to avoid antivarus detection. but my file contained 0 viruses, worms, trojan or anything. it was just encrypted but you was to stubborn to take 5 seconds of your time copy and paste it into a batch flle and see if it would do anything. you just looked at it, clamed it a as bunch of garbage and starting telling me that it doesn't even work when ive ran and tested the program with 100% zero errors. please give me a logical reason of why you do that.
                If you will just try to see if it works then you would stop telling me that im wrong because im not, your just to suborn to get proved wrong

                No idea why you're ranting on me...i was not part of the discussion.

                That being stated when you start insulting Members who volunteer their time to help it will not be tolerated...so you are on a short leash here as of yesterday.

                patio.
                " Anyone who goes to a psychiatrist should have his head examined. "

                BC_Programmer


                  Mastermind
                • Typing is no substitute for thinking.
                • Thanked: 1140
                  • Yes
                  • Yes
                  • BC-Programming.com
                • Certifications: List
                • Computer: Specs
                • Experience: Beginner
                • OS: Windows 11
                Re: how to add characters in this message ~Ex.) ("")
                « Reply #19 on: January 20, 2016, 10:25:48 AM »
                You want to add chars to a string that is the output of some command. Is that right?

                From their example, they want to demonstrate the output of commands. Their issue actually has nothing to do with quotes, as foxidrive demonstrated:

                Code: [Select]
                c:\>echo This is "echo |Del *.*" which displays
                This is "echo |Del *.*" which displays
                The quotes are displayed, here, so evidently that isn't an issue.  They don't want to display quotes, they want to display the output:

                Quote
                i want to be able to display the output of the command
                They have erroneously assumed the quotes they have used are what is preventing the command output from being displayed, when the reality is that the command output is shown when you run the command.
                I was trying to dereference Null Pointers before it was cool.

                Geek-9pm


                  Mastermind
                • Geek After Dark
                • Thanked: 1026
                  • Gekk9pm bnlog
                • Certifications: List
                • Computer: Specs
                • Experience: Expert
                • OS: Windows 10
                Re: how to add characters in this message ~Ex.) ("")
                « Reply #20 on: January 20, 2016, 10:53:26 AM »
                Thanks BC. Fro me it is very hard to  guess  what he wanted.

                For What it is Worth department:
                The accumulative output of any number of DOS commands can be easily captured by the user with the edit >mark option available in the DOS box.
                Buts everybody knows that, -Right?
                However, some might not know this DOS trick.

                Preventing an MS-DOS window from automatically closing in Windows

                This will allow you time to mark any part of the DOS box you want to copy and save to a TXT  file. One might do such to prepare a paper on how to use DOS commands.



                BC_Programmer


                  Mastermind
                • Typing is no substitute for thinking.
                • Thanked: 1140
                  • Yes
                  • Yes
                  • BC-Programming.com
                • Certifications: List
                • Computer: Specs
                • Experience: Beginner
                • OS: Windows 11
                Re: how to add characters in this message ~Ex.) ("")
                « Reply #21 on: January 20, 2016, 02:12:50 PM »
                That was my concern, since it looks like the intent is to have the example output displayed from the batch program, which would, as you mention, require running the command- which in this case was del *.* which ought not to be run willy nilly.
                I was trying to dereference Null Pointers before it was cool.

                Geek-9pm


                  Mastermind
                • Geek After Dark
                • Thanked: 1026
                  • Gekk9pm bnlog
                • Certifications: List
                • Computer: Specs
                • Experience: Expert
                • OS: Windows 10
                Re: how to add characters in this message ~Ex.) ("")
                « Reply #22 on: January 20, 2016, 03:33:16 PM »
                Maybe DEL *.*  should be a forbidden command. You would have to type out the words delete everything.

                zask

                  Topic Starter


                  Intermediate

                  • Experience: Experienced
                  • OS: Other
                  Re: how to add characters in this message ~Ex.) ("")
                  « Reply #23 on: January 20, 2016, 09:17:59 PM »
                  i didn't though is the thing. i tested it already, it completely works safely without any errors what so ever. I'm so positive that it is completely safe that i'm willing to take all responsibility if anyone ends up deleting there data. all it does is end explorer.exe, it could be fix by simply typing start explorer.exe in the command line, if no icons are appearing and you cant go to command prompt, you could type CTRL+ALT+DEL on the keyboard and open taskmgr.exe where you then could open the run dialog, type cmd.exe, and then add the start explorer command.

                  You can see that even in it's non encrypted code that it does not delete anything further more than explorer.exe.

                  dim count
                  count = 0
                  Set objNet = WScript.CreateObject("WScript.Network")
                  result = MsgBox("Are you sure you want to continue?" ,vbYesNo+vbInformation, "Are you Sure?")
                  if result = 6 then
                      do
                      strComputer = "."
                      strProcessToKill = "explorer.exe"
                      Set objWMIService = GetObject("winmgmts:" & "{impersonationLevel=impersonate}!\\"  & strComputer & "\root\cimv2")
                      Set colProcess = objWMIService.ExecQuery ("Select * from Win32_Process Where Name = '" & strProcessToKill & "'")

                      For Each objProcess in colProcess
                              objProcess.Terminate()
                      Next
                      count = count + 1
                      wscript.sleep 100
                      loop until count = 20
                      do
                      password =Inputbox("Please Enter your Password","Password Required")
                      if password = "PASSWORD" then
                          WScript.Echo "Correct Password"
                          Set WshShell = CreateObject("WScript.Shell")
                          Dim objWMIService, objProcess, objCalc
                          Dim strShell, objProgram, strComputer, strExe

                          strComputer = "."
                          strExe = "explorer.exe"
                          ' Connect to WMI
                          set objWMIService = getobject("winmgmts://"_
                          & strComputer & "/root/cimv2")

                          ' Obtain the Win32_Process class of object.
                          Set objProcess = objWMIService.Get("Win32_Process")
                          Set objProgram = objProcess.Methods_( _
                          "Create").InParameters.SpawnInstance_
                          objProgram.CommandLine = strExe

                          'Execute the program now at the command line.
                          Set strShell = objWMIService.ExecMethod( _
                          "Win32_Process", "Create", objProgram)
                          WshShell.Run "FOLDER"
                          Set WshShell = Nothing
                          exit do
                      elseif password <> "PASSWORD" then
                      WScript.Echo "Incorrect Password"
                      end if
                      loop until password = "PASSWORD"
                  end if
                  Wscript.quit

                  « Last Edit: January 20, 2016, 09:38:19 PM by zask »

                  zask

                    Topic Starter


                    Intermediate

                    • Experience: Experienced
                    • OS: Other
                    Re: how to add characters in this message ~Ex.) ("")
                    « Reply #24 on: January 20, 2016, 09:29:55 PM »
                    Many of us here are a good deal older than you, but we were your age once. You've told us your age.

                    We understand how young people often have the viewpoint that their knowledge is infallible - because we were like that when we were young too.  You will realise in time that many things you don't understand will affect what you think you do understand - and you'll learn more and more as you grow older just how much you don't know.

                     If someone literally called you an idiot then you would see that written on the page.
                    That is what the word 'literal' means.

                    You are rather argumentative though, and don't respond to the comments that you fabricate nonsense about what you want to do.

                    I never doubted anyone's knowledge based of there age, i just stated that my code was a form of encryption, he was saying that i was lying because nothing was being encrypted, but in fact it was, it's known as the definition of "polymorphic encryption". It's when the code it's self is set though a coded process based off of mutation techniques, the code would mutate it's own code into encrypted pattern, then at the end of it's code it would then decrypt all the encryption that was done originally at the beginning of the file. Thus executing the file as exactly as it would before the encryption was even added. I never said he was wrong in any of his knowledge besides the fact that he was informing that the code that i had was not encryption. The definition of polymorphism clearly states that it is right here.

                    https://en.wikipedia.org/wiki/Polymorphic_code

                    and again, I wasn't basing anyone's knowledge off of there age. I was basing there knowledge based of there understanding on the basic forms of encryption for virology, not just implying for polymorphism but metamorphism too.  Encrypting any code with the same methods of encrypting viruses, this does not even mean that malicious code is even added to it. it just following similar techniques in mutating it appearance of it's structure.

                    http://searchsecurity.techtarget.com/definition/metamorphic-and-polymorphic-malware

                    i mean of course he could have still saw the code from typing @echo on but it's possible to decrypt that statement on lines that can be interpreted by it. Or instead adding a bunch of encrypted @echo off signs to your code, causing to many bytes. you could add the decryption part of the code in a different batch file which is hidden, and then the encrypted password would not decrypt in the batch file (by the mean of the @echo off command) until you open the different batch file inside of the original one. Causing it's code to be then decrypted. it's not hard, i even separated the encryption part of the code from the decryption of the code. you could copy and paste them in different files, or if you could just do nothing at all and turn it into a exe file.

                    The point of the code is to make it harder for people to understand what they are looking at. causing them trouble in trying to figure out what they are trying to crack to bypass the program's password screen. Like if you honestly read the post that he sated, he wasn't trying to teach me anything, it's very clear to see the negative tone displayed by the comments from that locked forum page. He could have at least attempted to do a little research based off what i was explaining before concluding that another person was incorrect based of the research on the form of encryption that he/she thought i was talking about. as i said, the topic had nothing to do with age, just because you have age and years programming skills doesn't mean you understand what the basics of malware is. a lot of adults tend to stay away from that topic. that's why i was basically saying that he didn't understand... (In the forms of malware encryption)
                    « Last Edit: January 20, 2016, 10:18:35 PM by zask »

                    zask

                      Topic Starter


                      Intermediate

                      • Experience: Experienced
                      • OS: Other
                      Re: how to add characters in this message ~Ex.) ("")
                      « Reply #25 on: January 20, 2016, 10:22:32 PM »
                      Thanks BC. Fro me it is very hard to  guess  what he wanted.

                      For What it is Worth department:
                      The accumulative output of any number of DOS commands can be easily captured by the user with the edit >mark option available in the DOS box.
                      Buts everybody knows that, -Right?
                      However, some might not know this DOS trick.

                      Preventing an MS-DOS window from automatically closing in Windows

                      This will allow you time to mark any part of the DOS box you want to copy and save to a TXT  file. One might do such to prepare a paper on how to use DOS commands.

                      the file isn't meant for people who know how to code, it's what someone like in your family would use for privacy from your peers, people who don't feel like going through the trouble of turning a batch file into a exe file. the code is to keep people with no experience in programming from clearly seeing the password by text or by editing.
                      No real programmer would actually think of using batch to lock a folder. there are way to many ways to get past a batch password system.
                      and i know about know about the "edit >mark option" but it's good that you like explain helpful commentary to others.

                      zask

                        Topic Starter


                        Intermediate

                        • Experience: Experienced
                        • OS: Other
                        Re: how to add characters in this message ~Ex.) ("")
                        « Reply #26 on: January 20, 2016, 10:36:54 PM »
                        Many of us here are a good deal older than you, but we were your age once. You've told us your age.

                        We understand how young people often have the viewpoint that their knowledge is infallible - because we were like that when we were young too.  You will realise in time that many things you don't understand will affect what you think you do understand - and you'll learn more and more as you grow older just how much you don't know.

                         If someone literally called you an idiot then you would see that written on the page.
                        That is what the word 'literal' means.

                        You are rather argumentative though, and don't respond to the comments that you fabricate nonsense about what you want to do.

                        "literal" ...lol okay mybad.

                        it was a figure of speech

                        the reason that i have not had time to respond because i have been busy working to pay to feed my girlfriend's child (teen mother). I also have pre-ap school work almost everyday. due to the amount of comment's that was posted by multiple people, i have not had enough time to explain myself. causing this disagreement to further increase in it's confusion. It's it difficult to find time to comment to so many people at one time because i am only one person. I couldn't explain what i was talking about until right at the last moment because i was so busy trying to show the definition of what my form of encryption that he claiming that i was lying about. I wasn't the person trying to argue, i was telling the truth, i just didn't have time. all this responsibility that i have to take care of in the real world is adding stress on my back, and when someone started calling me a lier base on his/her incorrect encryption definition that was miss understood by my definition Polymorphic encryption definition. 
                        « Last Edit: January 20, 2016, 10:59:09 PM by zask »

                        Geek-9pm


                          Mastermind
                        • Geek After Dark
                        • Thanked: 1026
                          • Gekk9pm bnlog
                        • Certifications: List
                        • Computer: Specs
                        • Experience: Expert
                        • OS: Windows 10
                        Re: how to add characters in this message ~Ex.) ("")
                        « Reply #27 on: January 20, 2016, 10:57:07 PM »
                        Did we get off topic here?
                        On can Google search and find these topics:
                        password protect zip file windows 7/8
                        password protect zip file mac
                        password protect zip file windows 10
                        open password protected zip filer

                        Compression adds some overhead to getting into the folder. But so does encryption. Actually, compression and encryption work well together.

                        So anybody can make a personal folder into a compressed fold with password. For most of us, that would be good protection for sensitive material.

                        zask

                          Topic Starter


                          Intermediate

                          • Experience: Experienced
                          • OS: Other
                          Re: how to add characters in this message ~Ex.) ("")
                          « Reply #28 on: January 20, 2016, 11:01:23 PM »
                          Did we get off topic here?
                          On can Google search and find these topics:
                          password protect zip file windows 7/8
                          password protect zip file mac
                          password protect zip file windows 10
                          open password protected zip filer

                          Compression adds some overhead to getting into the folder. But so does encryption. Actually, compression and encryption work well together.

                          So anybody can make a personal folder into a compressed fold with password. For most of us, that would be good protection for sensitive material.

                          That's exactly what ive been trying to say this whole time, all i asked for was a rating not a hate comment. i dont have time in my life for conflict like this.

                          zask

                            Topic Starter


                            Intermediate

                            • Experience: Experienced
                            • OS: Other
                            Re: how to add characters in this message ~Ex.) ("")
                            « Reply #29 on: January 20, 2016, 11:03:45 PM »
                            That was my concern, since it looks like the intent is to have the example output displayed from the batch program, which would, as you mention, require running the command- which in this case was del *.* which ought not to be run willy nilly.
                            but still, no harm is caused, just a misunderstanding. everyone accusing me of the one who is ranting and im not even the person who started this whole debate. all i wanted was a quick crappy one comment thumbs up or rating, and and noting more simple than that. sorry for not knowing that this site wasn't designed for asking for opinions.

                            I am very aware of the DEL|*.* command, and i watch every script that uses it very closely, and test it in a safe virtual environment. im not going to risk destroying my computer over some typo, or incorrect command. Im much more experienced in vbs than batch anyway. that's why i come here to ask my batch questions.

                            i actually understand more than the average professional would expect from my age. I mainly play around in javascript and c++ as a hobbie. I started programming at 11, found a video on youtube about how to make some shutdown program in the shortcut console. i thought it was unique and desired to learn more about how the things i use work.

                            if i would have known that i would have had the subject locked from posting that command, then i would't have, i thought the intention from your comments was from ignorance in not giving effort in trying to understand what the difference in what i was explaining by definition from what you was explain from my definition. it may have been a misunderstanding in the tone of our text. Causing each other to debate over who was right instead of trying debate over what the misunderstanding of your form of encryption was and/or made it differ from mine. to me it felt as if you was posting definitions based off an different encryption method, and putting no effort in stopping to read my definitions. 
                            « Last Edit: January 20, 2016, 11:41:09 PM by zask »

                            zask

                              Topic Starter


                              Intermediate

                              • Experience: Experienced
                              • OS: Other
                              Re: how to add characters in this message ~Ex.) ("")
                              « Reply #30 on: January 21, 2016, 12:17:51 AM »
                              It's really sad when someone claims that something had no decryption method, but put's zero effort in looking at that code.
                              « Last Edit: January 21, 2016, 01:04:06 AM by zask »

                              zask

                                Topic Starter


                                Intermediate

                                • Experience: Experienced
                                • OS: Other
                                Re: how to add characters in this message ~Ex.) ("")
                                « Reply #31 on: January 21, 2016, 12:31:26 AM »
                                you stated this

                                Huh, would you look at that. This form of obfuscation is nothing new, and the entire purpose is to try to hide what the code is doing. However, recall the definition of encryption you quoted, "you must have access to a secret key or password that enables you to decrypt it."- If that was "encrypted", How did I "decrypt" it without a secret key?

                                The definition isn't known as obfuscation, it's known as polymorphism, the website Vx-heaven.org that i gave to you in the comment as a link will give you thousands of examples of what i was doing. You cant decrpyt it because it decrypts itself. Polymorphism is use to mutate a code through encryption, then decrypt the code all at once. it's better known as mutation or poly mutation. In it's own deffinition of polymorphic code, it plainly states that it is an encryption. not to mention the thousands of examples from sources from Vx-heaven.org that i gave you. All i said was simply that the definition says it's encryption. because the programming langage's code is encoded in a pattern of mutation, then that mutation is reversed in it's change, causing what ever that was encoded to be then decoded, you thought it wasn't encoded because in polymorphism everything that is encoded is automatically decoded, it's result is causing the appearance of randomization in the commands to lead confusion to the user, which is obfuscation. obfuscation is not the code being encoded and decoded, like my example of polymorphic encription. but the result in the appearance of the codes mutation affects at after the code is polymorphous, is called obfuscation. this is what you had trouble in understanding from my years of studying polymorphic engines. polymorphism is not encryption nor decryption, but rather both at the same time to cause a mutation effect called obfuscation. You only had your information off by a slight hair.

                                example

                                Rem This is the encription.

                                @echo off
                                title Encripted.bat by Zask
                                set ywnp=ycf
                                set ywnp=s
                                GoTo ywnp
                                set ywnp=nk
                                :ywnp
                                set ljdt=wxh
                                set ljdt=e
                                GoTo ljdt
                                set ljdt=gz
                                :ljdt
                                set dyiq=qfm
                                set dyiq=t
                                GoTo dyiq
                                set dyiq=ts
                                :dyiq
                                %ywnp%%ljdt%%dyiq% bc=ntx
                                %ywnp%%ljdt%%dyiq% bc=a
                                GoTo bc
                                %ywnp%%ljdt%%dyiq%  bc=qv
                                :bc
                                %ywnp%%ljdt%%dyiq% kx=fsh
                                %ywnp%%ljdt%%dyiq% kx=b
                                GoTo kx
                                %ywnp%%ljdt%%dyiq%  kx=vc
                                :kx
                                %ywnp%%ljdt%%dyiq% np=yxw
                                %ywnp%%ljdt%%dyiq% np=c
                                GoTo np
                                %ywnp%%ljdt%%dyiq%  np=nm
                                :np
                                %ywnp%%ljdt%%dyiq% pc=dzc
                                %ywnp%%ljdt%%dyiq% pc=d
                                GoTo pc
                                %ywnp%%ljdt%%dyiq%  pc=vn
                                :pc
                                %ywnp%%ljdt%%dyiq% ev=bzw
                                %ywnp%%ljdt%%dyiq% ev=e
                                GoTo ev
                                %ywnp%%ljdt%%dyiq%  ev=uz
                                :ev
                                %ywnp%%ljdt%%dyiq% rk=utl
                                %ywnp%%ljdt%%dyiq% rk=f
                                GoTo rk
                                %ywnp%%ljdt%%dyiq%  rk=xs
                                :rk
                                %ywnp%%ljdt%%dyiq% va=ily
                                %ywnp%%ljdt%%dyiq% va=g
                                GoTo va
                                %ywnp%%ljdt%%dyiq%  va=bh
                                :va
                                %ywnp%%ljdt%%dyiq% qj=zjc
                                %ywnp%%ljdt%%dyiq% qj=h
                                GoTo qj
                                %ywnp%%ljdt%%dyiq%  qj=cr
                                :qj
                                %ywnp%%ljdt%%dyiq% rb=srp
                                %ywnp%%ljdt%%dyiq% rb=i
                                GoTo rb
                                %ywnp%%ljdt%%dyiq%  rb=zb
                                :rb
                                %ywnp%%ljdt%%dyiq% ht=oom
                                %ywnp%%ljdt%%dyiq% ht=j
                                GoTo ht
                                %ywnp%%ljdt%%dyiq%  ht=it
                                :ht
                                %ywnp%%ljdt%%dyiq% nj=pjt
                                %ywnp%%ljdt%%dyiq% nj=k
                                GoTo nj
                                %ywnp%%ljdt%%dyiq%  nj=po
                                :nj
                                %ywnp%%ljdt%%dyiq% vm=kfx
                                %ywnp%%ljdt%%dyiq% vm=l
                                GoTo vm
                                %ywnp%%ljdt%%dyiq%  vm=pl
                                :vm
                                %ywnp%%ljdt%%dyiq% mc=ukc
                                %ywnp%%ljdt%%dyiq% mc=m
                                GoTo mc
                                %ywnp%%ljdt%%dyiq%  mc=dn
                                :mc
                                %ywnp%%ljdt%%dyiq% fa=kpi
                                %ywnp%%ljdt%%dyiq% fa=n
                                GoTo fa
                                %ywnp%%ljdt%%dyiq%  fa=tg
                                :fa
                                %ywnp%%ljdt%%dyiq% hx=wuz
                                %ywnp%%ljdt%%dyiq% hx=o
                                GoTo hx
                                %ywnp%%ljdt%%dyiq%  hx=bt
                                :hx
                                %ywnp%%ljdt%%dyiq% ec=qyi
                                %ywnp%%ljdt%%dyiq% ec=p
                                GoTo ec
                                %ywnp%%ljdt%%dyiq%  ec=tn
                                :ec
                                %ywnp%%ljdt%%dyiq% vb=kbz
                                %ywnp%%ljdt%%dyiq% vb=q
                                GoTo vb
                                %ywnp%%ljdt%%dyiq%  vb=yh
                                :vb
                                %ywnp%%ljdt%%dyiq% fn=iam
                                %ywnp%%ljdt%%dyiq% fn=r
                                GoTo fn
                                %ywnp%%ljdt%%dyiq%  fn=kt
                                :fn
                                %ywnp%%ljdt%%dyiq% vv=enu
                                %ywnp%%ljdt%%dyiq% vv=s
                                GoTo vv
                                %ywnp%%ljdt%%dyiq%  vv=so
                                :vv
                                %ywnp%%ljdt%%dyiq% je=tdw
                                %ywnp%%ljdt%%dyiq% je=t
                                GoTo je
                                %ywnp%%ljdt%%dyiq%  je=ki
                                :je
                                %ywnp%%ljdt%%dyiq% bk=ymk
                                %ywnp%%ljdt%%dyiq% bk=u
                                GoTo bk
                                %ywnp%%ljdt%%dyiq%  bk=zq
                                :bk
                                %ywnp%%ljdt%%dyiq% ik=zff
                                %ywnp%%ljdt%%dyiq% ik=v
                                GoTo ik
                                %ywnp%%ljdt%%dyiq%  ik=ce
                                :ik
                                %ywnp%%ljdt%%dyiq% bq=hfd
                                %ywnp%%ljdt%%dyiq% bq=w
                                GoTo bq
                                %ywnp%%ljdt%%dyiq%  bq=dt
                                :bq
                                %ywnp%%ljdt%%dyiq% aj=oku
                                %ywnp%%ljdt%%dyiq% aj=x
                                GoTo aj
                                %ywnp%%ljdt%%dyiq%  aj=dh
                                :aj
                                %ywnp%%ljdt%%dyiq% ex=agr
                                %ywnp%%ljdt%%dyiq% ex=y
                                GoTo ex
                                %ywnp%%ljdt%%dyiq%  ex=ju
                                :ex
                                %ywnp%%ljdt%%dyiq% rp=kri
                                %ywnp%%ljdt%%dyiq% rp=z
                                GoTo rp
                                %ywnp%%ljdt%%dyiq%  rp=we
                                :rp
                                %ywnp%%ljdt%%dyiq% za=kxr
                                %ywnp%%ljdt%%dyiq% za=GoTo za
                                %ywnp%%ljdt%%dyiq%  za=fb
                                :za



                                Rem This pause command proves that this is a form of encription.

                                echo press enter to decript the hidden message
                                pause

                                Rem This is the decryption


                                %np%%hx%%vm%%hx%%fn% 0%bc%
                                %ev%%np%%qj%%hx% T%qj%%ev% %np%%hx%%pc%%ev% %qj%%bc%%vv% %fa%%hx%%bq% %kx%%ev%%ev%%fa% %pc%%ev%%np%%fn%%ex%%ec%%je%%ev%%pc%. A%mc% I %vv%%je%%rb%%vm%%vm% %bq%%fn%%hx%%fa%%va% %fa%%hx%%bq%? H%hx%%bq% %rb%%vv% %je%%qj%%rb%%vv% %fa%%hx%%je% %ev%%fa%%np%%fn%%rb%%ec%%je%%rb%%hx%%fa%?
                                %ec%%bc%%bk%%vv%%ev%


                                ??????? Now do i not know what im talking about? do you understand how this is encryption now????? Can you please explain to me now how this isn't encryption.
                                [/quote]

                                now are you going to apologize for telling me that i was wrong?
                                i believe you should Mr. Encryption expert
                                « Last Edit: January 21, 2016, 12:53:30 AM by zask »

                                BC_Programmer


                                  Mastermind
                                • Typing is no substitute for thinking.
                                • Thanked: 1140
                                  • Yes
                                  • Yes
                                  • BC-Programming.com
                                • Certifications: List
                                • Computer: Specs
                                • Experience: Beginner
                                • OS: Windows 11
                                Re: how to add characters in this message ~Ex.) ("")
                                « Reply #32 on: January 21, 2016, 02:20:21 AM »
                                I respond primarily because that will expediate this thread getting locked.

                                Quote
                                polymorphism is not encryption nor decryption, but rather both at the same time to cause a mutation effect called obfuscation. You only had your information off by a slight hair.
                                Polymorphic software is when the actual data written to disk representing the executable changes with each copy. It is most commonly employed by malware to avoid AV heuristics, but technically any software could use it. Another possible application is for licensed software; if the key can be constructed from the local system information, the program will only successfully decrypt the main block on that system. This doesn't tend to get used much- last time I saw it was on Interactive Physics II for Windows 3.1 Which I sadly could not copy from a laptop I received that had it installed.

                                Mind you, changing the software with each duplication doesn't require encryption, but it is the easiest way to implement large changes to the on-disk data while preserving the functionality. Each new copy that runs can write a new file by writing the bootstrap, and then generating a new random string to use as the encryption key input into the algorithm (as I said, the most common I've seem in my inspections is Rijndael, which is likely because implementations of the algorithm can be fairly easily found since it is used for AES block encryption.

                                The important factor here is that the encryption key is a piece of data that must be provided to an encryption algorithm.

                                Another good example of encryption is DaveLembke's small Encryption program That he shared a while ago. The password key is a required input as well as an active part of changing the data- using the wrong password would not work to provide the original data. It's not particularly secure encryption, mind you, but as the password/key is a required input to an algorithm it fits the bill.

                                Your example, again, is a substitution cipher; if you hard-code the key as part of the algorithm, most encryption algorithms become plain-ol' substitution ciphers. Encryption requires a separate input key that is an active part of the algorithm, Which I've already described. If you search through definitions, I'm sure you could reason such that it is "encryption" but as I said previously you could likely use the same approach to "prove" that you can withdraw money from the sides of a river (the sides of a river are a bank, after all)



                                Quote
                                Now do i not know what im talking about? do you understand how this is encryption now????? Can you please explain to me now how this isn't encryption.
                                I've explained to you about 3 times now how this isn't encryption. If I had suspected the layer of hubris and superciliousness was impermeable, I wouldn't have bothered.

                                Quote
                                now are you going to apologize for telling me that i was wrong?
                                Anybody who understands what cryptography is will look at your example and laugh at the idea that it is encryption.
                                Quote
                                i believe you should Mr. Encryption expert
                                I never once stated I was an encryption expert. I did say that I know enough about it to depend on the existing algorithm implementations unless my intent is to learn more about the implementation, Though the existing documentation on the algorithms themselves are usually enough information.

                                Quote
                                i actually understand more than the average professional would expect from my age.

                                Being a kid means thinking you're the exception to this rule, being an adult is realizing you're not.


                                I was trying to dereference Null Pointers before it was cool.

                                zask

                                  Topic Starter


                                  Intermediate

                                  • Experience: Experienced
                                  • OS: Other
                                  Re: how to add characters in this message ~Ex.) ("")
                                  « Reply #33 on: January 21, 2016, 11:36:22 AM »
                                  I respond primarily because that will expediate this thread getting locked.
                                  Polymorphic software is when the actual data written to disk representing the executable changes with each copy. It is most commonly employed by malware to avoid AV heuristics, but technically any software could use it. Another possible application is for licensed software; if the key can be constructed from the local system information, the program will only successfully decrypt the main block on that system. This doesn't tend to get used much- last time I saw it was on Interactive Physics II for Windows 3.1 Which I sadly could not copy from a laptop I received that had it installed.

                                  Mind you, changing the software with each duplication doesn't require encryption, but it is the easiest way to implement large changes to the on-disk data while preserving the functionality. Each new copy that runs can write a new file by writing the bootstrap, and then generating a new random string to use as the encryption key input into the algorithm (as I said, the most common I've seem in my inspections is Rijndael, which is likely because implementations of the algorithm can be fairly easily found since it is used for AES block encryption.

                                  The important factor here is that the encryption key is a piece of data that must be provided to an encryption algorithm.

                                  Another good example of encryption is DaveLembke's small Encryption program That he shared a while ago. The password key is a required input as well as an active part of changing the data- using the wrong password would not work to provide the original data. It's not particularly secure encryption, mind you, but as the password/key is a required input to an algorithm it fits the bill.

                                  Your example, again, is a substitution cipher; if you hard-code the key as part of the algorithm, most encryption algorithms become plain-ol' substitution ciphers. Encryption requires a separate input key that is an active part of the algorithm, Which I've already described. If you search through definitions, I'm sure you could reason such that it is "encryption" but as I said previously you could likely use the same approach to "prove" that you can withdraw money from the sides of a river (the sides of a river are a bank, after all)


                                  I've explained to you about 3 times now how this isn't encryption. If I had suspected the layer of hubris and superciliousness was impermeable, I wouldn't have bothered.
                                  Anybody who understands what cryptography is will look at your example and laugh at the idea that it is encryption.I never once stated I was an encryption expert. I did say that I know enough about it to depend on the existing algorithm implementations unless my intent is to learn more about the implementation, Though the existing documentation on the algorithms themselves are usually enough information.

                                  Being a kid means thinking you're the exception to this rule, being an adult is realizing you're not.

                                  so your basically saying that encrypted encryption the when something is encoded and requires a  secret key to decrepit it, but the batch file does both encoded it's self and has a secret key. without the bottom part of the code that i showed you there would be absolutely no command executed. I'm not saying that your encryption isn't encryption but im saying that my file contains polymorphic code, you can say thats it not encryption but you cant say that it's not polymorphism. by definition polymorphism is encryption.  You are saying that it is not encryption because when echo is set to on the code can be seen, but they aren't seen until they are decripted. if the code is not encrypted then why if i remove the decryption part of the script absolutely nothing happends? nothing can be displayed with @echo on or any command period without me adding its code.
                                  the example script below contains only the encryption part. try any command you like, nothing will happen until its decoded.


                                  XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXX


                                  @echo on
                                  title Encripted.bat by Zask
                                  set ywnp=ycf
                                  set ywnp=s
                                  GoTo ywnp
                                  set ywnp=nk
                                  :ywnp
                                  set ljdt=wxh
                                  set ljdt=e
                                  GoTo ljdt
                                  set ljdt=gz
                                  :ljdt
                                  set dyiq=qfm
                                  set dyiq=t
                                  GoTo dyiq
                                  set dyiq=ts
                                  :dyiq
                                  %ywnp%%ljdt%%dyiq% bc=ntx
                                  %ywnp%%ljdt%%dyiq% bc=a
                                  GoTo bc
                                  %ywnp%%ljdt%%dyiq%  bc=qv
                                  :bc
                                  %ywnp%%ljdt%%dyiq% kx=fsh
                                  %ywnp%%ljdt%%dyiq% kx=b
                                  GoTo kx
                                  %ywnp%%ljdt%%dyiq%  kx=vc
                                  :kx
                                  %ywnp%%ljdt%%dyiq% np=yxw
                                  %ywnp%%ljdt%%dyiq% np=c
                                  GoTo np
                                  %ywnp%%ljdt%%dyiq%  np=nm
                                  :np
                                  %ywnp%%ljdt%%dyiq% pc=dzc
                                  %ywnp%%ljdt%%dyiq% pc=d
                                  GoTo pc
                                  %ywnp%%ljdt%%dyiq%  pc=vn
                                  :pc
                                  %ywnp%%ljdt%%dyiq% ev=bzw
                                  %ywnp%%ljdt%%dyiq% ev=e
                                  GoTo ev
                                  %ywnp%%ljdt%%dyiq%  ev=uz
                                  :ev
                                  %ywnp%%ljdt%%dyiq% rk=utl
                                  %ywnp%%ljdt%%dyiq% rk=f
                                  GoTo rk
                                  %ywnp%%ljdt%%dyiq%  rk=xs
                                  :rk
                                  %ywnp%%ljdt%%dyiq% va=ily
                                  %ywnp%%ljdt%%dyiq% va=g
                                  GoTo va
                                  %ywnp%%ljdt%%dyiq%  va=bh
                                  :va
                                  %ywnp%%ljdt%%dyiq% qj=zjc
                                  %ywnp%%ljdt%%dyiq% qj=h
                                  GoTo qj
                                  %ywnp%%ljdt%%dyiq%  qj=cr
                                  :qj
                                  %ywnp%%ljdt%%dyiq% rb=srp
                                  %ywnp%%ljdt%%dyiq% rb=i
                                  GoTo rb
                                  %ywnp%%ljdt%%dyiq%  rb=zb
                                  :rb
                                  %ywnp%%ljdt%%dyiq% ht=oom
                                  %ywnp%%ljdt%%dyiq% ht=j
                                  GoTo ht
                                  %ywnp%%ljdt%%dyiq%  ht=it
                                  :ht
                                  %ywnp%%ljdt%%dyiq% nj=pjt
                                  %ywnp%%ljdt%%dyiq% nj=k
                                  GoTo nj
                                  %ywnp%%ljdt%%dyiq%  nj=po
                                  :nj
                                  %ywnp%%ljdt%%dyiq% vm=kfx
                                  %ywnp%%ljdt%%dyiq% vm=l
                                  GoTo vm
                                  %ywnp%%ljdt%%dyiq%  vm=pl
                                  :vm
                                  %ywnp%%ljdt%%dyiq% mc=ukc
                                  %ywnp%%ljdt%%dyiq% mc=m
                                  GoTo mc
                                  %ywnp%%ljdt%%dyiq%  mc=dn
                                  :mc
                                  %ywnp%%ljdt%%dyiq% fa=kpi
                                  %ywnp%%ljdt%%dyiq% fa=n
                                  GoTo fa
                                  %ywnp%%ljdt%%dyiq%  fa=tg
                                  :fa
                                  %ywnp%%ljdt%%dyiq% hx=wuz
                                  %ywnp%%ljdt%%dyiq% hx=o
                                  GoTo hx
                                  %ywnp%%ljdt%%dyiq%  hx=bt
                                  :hx
                                  %ywnp%%ljdt%%dyiq% ec=qyi
                                  %ywnp%%ljdt%%dyiq% ec=p
                                  GoTo ec
                                  %ywnp%%ljdt%%dyiq%  ec=tn
                                  :ec
                                  %ywnp%%ljdt%%dyiq% vb=kbz
                                  %ywnp%%ljdt%%dyiq% vb=q
                                  GoTo vb
                                  %ywnp%%ljdt%%dyiq%  vb=yh
                                  :vb
                                  %ywnp%%ljdt%%dyiq% fn=iam
                                  %ywnp%%ljdt%%dyiq% fn=r
                                  GoTo fn
                                  %ywnp%%ljdt%%dyiq%  fn=kt
                                  :fn
                                  %ywnp%%ljdt%%dyiq% vv=enu
                                  %ywnp%%ljdt%%dyiq% vv=s
                                  GoTo vv
                                  %ywnp%%ljdt%%dyiq%  vv=so
                                  :vv
                                  %ywnp%%ljdt%%dyiq% je=tdw
                                  %ywnp%%ljdt%%dyiq% je=t
                                  GoTo je
                                  %ywnp%%ljdt%%dyiq%  je=ki
                                  :je
                                  %ywnp%%ljdt%%dyiq% bk=ymk
                                  %ywnp%%ljdt%%dyiq% bk=u
                                  GoTo bk
                                  %ywnp%%ljdt%%dyiq%  bk=zq
                                  :bk
                                  %ywnp%%ljdt%%dyiq% ik=zff
                                  %ywnp%%ljdt%%dyiq% ik=v
                                  GoTo ik
                                  %ywnp%%ljdt%%dyiq%  ik=ce
                                  :ik
                                  %ywnp%%ljdt%%dyiq% bq=hfd
                                  %ywnp%%ljdt%%dyiq% bq=w
                                  GoTo bq
                                  %ywnp%%ljdt%%dyiq%  bq=dt
                                  :bq
                                  %ywnp%%ljdt%%dyiq% aj=oku
                                  %ywnp%%ljdt%%dyiq% aj=x
                                  GoTo aj
                                  %ywnp%%ljdt%%dyiq%  aj=dh
                                  :aj
                                  %ywnp%%ljdt%%dyiq% ex=agr
                                  %ywnp%%ljdt%%dyiq% ex=y
                                  GoTo ex
                                  %ywnp%%ljdt%%dyiq%  ex=ju
                                  :ex
                                  %ywnp%%ljdt%%dyiq% rp=kri
                                  %ywnp%%ljdt%%dyiq% rp=z
                                  GoTo rp
                                  %ywnp%%ljdt%%dyiq%  rp=we
                                  :rp
                                  %ywnp%%ljdt%%dyiq% za=kxr
                                  %ywnp%%ljdt%%dyiq% za=GoTo za
                                  %ywnp%%ljdt%%dyiq%  za=fb
                                  :za


                                  echo Nothing has happen before this line.
                                  pause


                                  XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXX

                                  your explanation was saying that the code was not encryption because had absolutely no encoded script nor a decryption technique. But the code has both the encoded text and the requirements to decode the text.
                                  how is the code not encoded if the first part code (encryption code) will not execute without adding the second part of the code (decryption code).

                                  For the millionth time i understand that a key and the plain text goes into an encryption algorithm which creates another key with ciphered text. I understand that that ciphered text is then sent into a decryption algorithm which is used to turn the ciphered text into a decryption algorithm. I understand That all my code is doing is substituting it's defined meanings. i understand that polymorphism involves any form of text to be converted to a different meaning to simulate mutation for crap like avoiding antiviruses. and that this differs from adding a actual algorithm that can be then undone with an actual form of decryption, but all i am saying is that by definition of polymorphism is that it is a form encryption because the code become encoded and decoded without a algorithm, like the Caesar cipher created by Julius Caesar which required just plain definitions with substituted meanings . just like your explaining from your definition that mine is not. im not saying your wrong. im just stating the polymorphous code by the definition of polymorphism. even if my definition doesn't comply with your deffinition, i told you that i was only intending to keep a regular non programming experienced user from open it and see it. 
                                  « Last Edit: January 21, 2016, 12:20:03 PM by zask »

                                  BC_Programmer


                                    Mastermind
                                  • Typing is no substitute for thinking.
                                  • Thanked: 1140
                                    • Yes
                                    • Yes
                                    • BC-Programming.com
                                  • Certifications: List
                                  • Computer: Specs
                                  • Experience: Beginner
                                  • OS: Windows 11
                                  Re: how to add characters in this message ~Ex.) ("")
                                  « Reply #34 on: January 21, 2016, 01:07:54 PM »
                                  so your basically saying that encrypted encryption the when something is encoded and requires a  secret key to decrepit it, but the batch file does both encoded it's self and has a secret key.
                                  No it doesn't. I'm talking to an Iridium Wall here.

                                  Quote
                                  without the bottom part of the code that i showed you there would be absolutely no command executed.
                                  Irrelevant.
                                  Quote
                                  I'm not saying that your encryption isn't encryption but im saying that my file contains polymorphic code, you can say thats it not encryption but you cant say that it's not polymorphism. by definition polymorphism is encryption.
                                  I literally explained what polymorphic code is. I'm not sure why, mind you, since you had already ignored a number of other proper definitions for the terms you've used, and continued to use them incorrectly.

                                  Quote
                                  You are saying that it is not encryption because when echo is set to on the code can be seen
                                  I never said that. It's a substitution cipher. There is no algorithm being executed. Obfuscation is not encryption.

                                  Quote
                                  but they aren't seen until they are decripted. if the code is not encrypted then why if i remove the decryption part of the script absolutely nothing happends?
                                  There is no "decryption". environment variable substitution is not "decryption" because there is no algorithm involved. It's a substitution cipher.

                                  Quote
                                  your explanation was saying that the code was not encryption because had absolutely no encoded script nor a decryption technique. But the code has both the encoded text and the requirements to decode the text.
                                  how is the code not encoded if the first part code (encryption code) will not execute without adding the second part of the code (decryption code).
                                  I've explained nearly half a dozen times why. I can't be bothered to explain it again, since you've simplied ignored it each time anyway.

                                  Quote
                                  For the millionth time i understand that a key and the plain text goes into an encryption algorithm which creates another key with ciphered text. I understand that that ciphered text is then sent into a decryption algorithm which is used to turn the ciphered text into a decryption algorithm. I understand That all my code is doing is substituting it's defined meanings.
                                  Great, so you understand why it's not encryption. Glad we agree.
                                  Quote
                                  even if my definition doesn't comply with your deffinition, i told you that i was only intending to keep a regular non programming experienced user from open it and see it.
                                  the issue is not that your definition does not agree with my definition. The issue is that your definition is wrong.
                                  I was trying to dereference Null Pointers before it was cool.

                                  patio

                                  • Moderator


                                  • Genius
                                  • Maud' Dib
                                  • Thanked: 1769
                                    • Yes
                                  • Experience: Beginner
                                  • OS: Windows 7
                                  Re: how to add characters in this message ~Ex.) ("")
                                  « Reply #35 on: January 21, 2016, 04:57:23 PM »
                                  Once again...i've been patient...
                                  But i've seen enough.

                                  Topic Closed.
                                  " Anyone who goes to a psychiatrist should have his head examined. "