Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon.

Pages: 1-

MouseEvents

Name: Anonymous 2010-05-07 2:36

I have a really weird problem.
I have an application (lets call it 'App A') that blocks simulated mouse events from 'App B'. How would I make 'App B's simulated mouse events invisible to 'App A' so that its not blocked.

Is there a way to talk to the hardware directly and make the simulated mouse events look like real events?

Sorry if this doesn't make sense.

Name: Anonymous 2010-05-07 3:22

Name: Anonymous 2010-05-07 3:40

>>2
either you are retarded or you have poor reading comprehension skills.

Name: Anonymous 2010-05-07 5:27

talk to the hardware directly
I'm not sure you understand how computers work.

Anyway you can do this:
killall 'App A'

Name: Anonymous 2010-05-07 5:33

>>4
the point is no to terminate the other application.

Name: Anonymous 2010-05-07 7:48

I don't know what the hell are you doing but it could be feasible to do a retarded driver from the SDK examples and invent yourself x protocol with your app. Anyway sure there's a more simple way and hence better to do what you are thinking.

without idea of how the win32 message api works

Name: Anonymous 2010-05-07 8:19

>>3
What is wrong with what I linked? SendInput is transparent to the callee (Well, almost- I'm sure they can use detours or something to intercept SendInput calls but that would be completely retarded, and you could always detour the detours functions before loading their application). Unless you are doing it wrong (i.e.: not creating authentic mouse movement to a location before clicking)- there should be no way for the application to know. Feel free to restate the problem if you feel you were unclear on the requirements first time around.

Name: Anonymous 2010-05-07 9:12

authentic mouse movement to a location before clicking
Which completely does not happen all the time.

Consider: stylus pads, tablets, touchscreens.

Name: Anonymous 2010-05-08 2:23

>>8
I'm well aware of that but I think you underestimate how much usability some programs will sacrifice for security (Poker Clients, etc..).

Name: Anonymous 2010-05-08 7:51

>>9
And they still don't achieve any security against a capable attacker.
>>1
What do you mean by ``blocked''. Learn to reverse engineer code and understand how this ``blocking'' works, then you will find your answer on how to achieve what you want.

Name: Anonymous 2013-08-31 20:08


Doing it in a practice match is only a quick way though, the jp wiki mentions another slower way, just take a single ship fleet to 1-1 and return to base after the first battle and keep doing that until it sparkles.

Name: Anonymous 2013-08-31 21:38


11) 不思議の大魔境: "大魔境" is translated as Pandemonium in the game, so it is "Mystery Pandemonium".
It is really hard. It becomes harder latter, when you can't kill high defense monsters like Kaguya. I couldn't beat it yet.

Don't change these.
Name: Email:
Entire Thread Thread List