There is no way to confirm that intentions for an action as such would not be used for malicious intent.yes but not .docx But .txt ....i just do some researches .... if you want to know more this my facebook https://www.facebook.com/mina.nageh.568 ..... and do you know how ?????/
I remember in my earlier school days, we had a network drive which was full of student's work along with resources. Someone in our school had made a word document on the drive called 'work' and in that document there were three flash-based games which were able to run successfully, it was left undiscovered for about two to three years until one day it was taken off the network drive.
So I would sell and smuggle games in school by putting them in doc files. How I did it? I simply just dragged and dropped the games into a word document and it simply worked.
I think what you want to do is known as steganography. So have a look into that. I would have guided you in the right direction but I suspect, you will be using this for malicious intent.
no bro i am good guy ..... is there any way to open the game directly after clicking on the word document
Nope, you had to manually click onto the file in order to run it.
there's no any other wayNope, you had to manually click onto the file in order to run it.
there's no any other way
The answer is No (as of now or to my intentions at least). Unless you are referring to social engineering tactics to make the user believe it was a text file when it really had an .exe extension - although I won't dive into this information.is there any way to open the game directly after clicking on the word document
Now you want to bypass code signing certificate checks so Windows forgets that your executable isn't digitally signed and that the user doesn't receive any sort of confirmation before your "untrusted" program runs?how do i change the name of the file from games.exe to games and put an game icon and when i click on the game file open without showing me this security warning View attachment 111987 View attachment 111988 View attachment 111989 View attachment 111990
Surely you must understand that it is very important to this community that no one becomes involved with things relating to malicious intent? Sorry to burst your bubble but sending your Facebook profile (whether it is genuine or staged to look real) is not any sort of valid proof that you are not trying to do something with malicious intent.
In fact, one common thing that people who are trying to do something with malicious intent do on forums (when they are requesting assistance for something), is exactly what you've done... Mention a lot about how they are good and not trying to do something bad... without any real justification to what their intentions are. I'm not saying that you DO have malicious intent, but surely you must understand what I am trying to say?
No offence but I really don't believe that you are just doing some "research". Please elaborate if possible (without the double posts this time).
Of course you are, how didn't I guess this?!i am doing some researches about windows bugs
Of course you are, how didn't I guess this?!
No, but on a serious note, someone who is performing real research on Windows bugs/vulnerabilities and takes their work seriously won't run to a security forum asking how to do things that seem suspicious without providing real information behind their goals. It looks to me that you've just made that response up on the spot, you haven't provided any additional information, again!
How can you perform research on Windows bugs/vulnerabilities when you don't know how features you are performing research on actually work? You literally just posted here asking how you can bypass the code signing certificate notification warnings. Someone who is being ethical and is really doing as they say won't behave like this.
It looks like that you want to read about some research on Windows as opposed to you doing the research - otherwise why else would you be asking how to do it all? If you aren't doing the research then it doesn't count as your research. Tip: You can read about some Windows bugs/vulnerabilities here: Exploits Database by Offensive Security
Even based on the screenshots you've posted the only idea I get is that you are trying to do something malicious. Look at the screenshots you posted: you've changed the icon of the program to an icon of Angry Birds (a game you don't actually own), you've changed the name of the program to games.exe and now you are trying to conceal evidence of it running on the system so the user doesn't become aware.
On top of all of this, now you want to bypass code signing certificate checks to avoid the warning when you try to run the program... How much closer to looking like a malware developer do you want to get?
Of course you are, how didn't I guess this?!
No, but on a serious note, someone who is performing real research on Windows bugs/vulnerabilities and takes their work seriously won't run to a security forum asking how to do things that seem suspicious without providing real information behind their goals. It looks to me that you've just made that response up on the spot, you haven't provided any additional information, again!
How can you perform research on Windows bugs/vulnerabilities when you don't know how features you are performing research on actually work? You literally just posted here asking how you can bypass the code signing certificate notification warnings. Someone who is being ethical and is really doing as they say won't behave like this.
It looks like that you want to read about some research on Windows as opposed to you doing the research - otherwise why else would you be asking how to do it all? If you aren't doing the research then it doesn't count as your research. Tip: You can read about some Windows bugs/vulnerabilities here: Exploits Database by Offensive Security
Even based on the screenshots you've posted the only idea I get is that you are trying to do something malicious. Look at the screenshots you posted: you've changed the icon of the program to an icon of Angry Birds (a game you don't actually own), you've changed the name of the program to games.exe and now you are trying to conceal evidence of it running on the system so the user doesn't become aware.
On top of all of this, now you want to bypass code signing certificate checks to avoid the warning when you try to run the program... How much closer to looking like a malware developer do you want to get?