Up until now I have, as much as possible, been using tools to 'mess around' with EXE/DLL public hacks (yoda's Cryptor, ASProtect, MPRESS). Just wondered if there is any real point? I'm guessing the code is still the same (as thus, detectable by VAC) once running/injected.

-N1pp@