
googleba88693c99e7e8ce.html
WinLicense®
Łączy moc ochrony oprogramowania (jak Themida), z mocą zaawansowanej kontroli licencji. Oferuje szeroki zakres zaawansowanych i elastycznych technik, które pozwalają programistom na bezpieczną dystrybucję wersji testowych swoich aplikacji.
Trial/Licensing Features:
![]() |
Machine dependent keys |
![]() |
SmartActivate® keys for elegant registration systems |
![]() |
Multiple trial expiration types |
![]() |
Possibility to combine several expiration types for trial and license keys |
![]() |
Powerful engine to store the trial period in the system |
![]() |
Complete SDK with more than 50 exported functions |
![]() |
Full .NET SDK support |
![]() |
Custom trial counters SDK for different developer’s needs |
![]() |
Easy support to create your own licensing systems via web server |
![]() |
Country locking for trial and license keys |
![]() |
Trial extension keys to extend the trial in an expired application |
![]() |
Text keys registrations |
![]() |
File key registrations |
![]() |
Registry keys registrations |
![]() |
Independent password protection for either Trial or registered versions |
![]() |
Expirable license keys |
![]() |
Tracking and detection of stolen keys |
![]() |
Customization for all trial/registration messages with possibility to include/exclude them from being displayed by WinLicense |
![]() |
Embedded generators in GUI to create licenses, passwords and trial extensions keys |
![]() |
Specific key generators can be automatically generated for every protected application |
![]() |
Custom data field in license keys for different developer’s needs |
![]() |
Database driven implementation to keep safe record of all your software, customers and licenses |
Protection Features:
![]() |
Anti-debugger techniques that detect/fool any kind of debugger |
![]() |
Anti-memory dumpers techniques for any Ring3 and Ring0 dumpers |
![]() |
Different encryption algorithms and keys in each protected application |
![]() |
Anti-API scanners techniques that avoids reconstruction of original import table |
![]() |
Automatic decompilation and scrambling techniques in target application |
![]() |
Virtual Machine emulation in specific blocks of code |
![]() |
Advanced Mutator engine |
![]() |
SDK communication with protection layer |
![]() |
Anti-disassember techniques for any static and interactive disassemblers |
![]() |
Multiple polymorphic layers with more than 50.000 permutations |
![]() |
Advanced API-Wrapping techniques |
![]() |
Anti-monitors techniques against file and registry monitors |
![]() |
Random garbage code insertion between real instructions |
![]() |
Specialized protection threads |
![]() |
Advanced Threads network communication |
![]() |
Anti-Memory patching and CRC techniques in target application |
![]() |
Metamorphic engine to scramble original instructions |
![]() |
Advanced Entry point protection |
![]() |
Dynamic encryption in target application |
![]() |
Anti-tracing code insertion between real instructions |
![]() |
Advanced Anti-breakpoint manager |
![]() |
Real time protection in target application |
![]() |
Compression of target application, resources and protection code |
![]() |
Anti-“debugger hiders” techniques |
![]() |
Full mutation in protection code to avoid pattern recognition |
![]() |
Real-time simulation in target application |
![]() |
Intelligent protection code insertion inside target application |
![]() |
Random internal data relocation |
![]() |
Possibility to customize dialogs in protected application |
![]() |
Support of command line |
![]() |
Many many more... |