Consider it like this: Client wants to join the protected server. So he runs a reqired executable on his PC after running jj2 (if he doesn't do so, server will block him). While connecting to the server, the software will make jj2 download a fresh and working component of the anti-cheating software from the server itself and then execute it on the client's PC. There will be a unique algorithm in the downloaded component each time it is downloaded and this algorithm will be used to process some data received from the server and return the result back to the server. Sort of like a challenge-response approach. This way the server will know for sure that the software has not been modified if the returned result matches the one produced on the server.
__________________
<a href="http://nmap.org/"><img border="0" alt="Nmap Security Scanner" src="http://images.insecure.org/nmap/images/prop/nmap_bnr_matrix_pfos.gif"/></a>
|