You have a piece of code in the loader of the module (that has to be run before module can be used that checks the exe is the unmodified one. The module can either refuse to run, or more usefully silently report the user to the server. By not providing immeidate feedback its less clear how there hack is being detected
k0zy - Mon Aug 11, 2008 6:25 am
Post subject:
Thanks!
I'll go for the closed-source security module.