Now 300 visitors
Today:0 Yesterday:0
Total: 445763 S 0P 0R
2026-05-05, Week 19
Member Login
Call for Paper
Committee
Paper Submission
Find My Paper
Author Homepage
Statistics & History
Welcome Message
TACT Journal Homepage
Paper Procedure
FAQ
Registration & Invoice
Paper Archives
Outstanding Papers
Program & Proceedings
Presentation Platform
Hotel & Travel Info
Photo Gallery
Scheduler Login
Seminar
Archives Login
Sponsors




















IEEE/ICACT20210206 Question.2
Questioner: James_Lan@htx.gov.sg    2021-02-09 ¿ÀÈÄ 12:40:21
IEEE/ICACT20210206 Answer.2
Answer by Auhor kbchawal@kmitl.ac.th   2021-02-09 ¿ÀÈÄ 12:40:21
Hi, thanks for the sharing. As the program uses python then is it assumed the victim has the required python program and library installed? if not, what are your views on the programming binary suitable for ransomware encryption/decryption? Thanks. Thank you for your question. In this research the target OS is Windows, therefore, the program is designed for Windows users only. I used Pyinstaller to convert the program and all its dependencies (libraries) to make a .exe file for this program. which then can be run on almost every version of Windows that is still in use without the prior installation of python or any of its dependencies. thank you.

Select Voice