googleba88693c99e7e8ce.html
tel. 22 813 10 29 email: biuro@gravsoft.pl
pon-pt w godz. 8-16

Gravsoft informatyka śledcza

Home Komponenty dla programistów › WinLicense®

WinLicense®

WinLicense®


Łączy moc ochrony oprogramowania (jak Themida), z mocą zaawansowanej kontroli licencji. Oferuje szeroki zakres zaawansowanych i elastycznych technik, które pozwalają programistom na bezpieczną dystrybucję wersji testowych swoich aplikacji.

licencje forensic


Trial/Licensing Features:

Machine dependent keys
SmartActivate® keys for elegant registration systems
Multiple trial expiration types
Possibility to combine several expiration types for trial and license keys
Powerful engine to store the trial period in the system
Complete SDK with more than 50 exported functions
Full .NET SDK support
Custom trial counters SDK for different developer’s needs
Easy support to create your own licensing systems via web server
Country locking for trial and license keys 
Trial extension keys to extend the trial in an expired application 
Text keys registrations
File key registrations
Registry keys registrations
Independent password protection for either Trial or registered versions
Expirable license keys
Tracking and detection of stolen keys
Customization for all trial/registration messages with possibility to include/exclude them from being displayed by WinLicense
Embedded generators in GUI to create licenses, passwords and trial extensions keys
Specific key generators can be automatically generated for every protected application  
Custom data field in license keys for different developer’s needs
Database driven implementation to keep safe record of all your software, customers and licenses



Protection Features:

Anti-debugger techniques that detect/fool any kind of debugger
Anti-memory dumpers techniques for any Ring3 and Ring0 dumpers
Different encryption algorithms and keys in each protected application
Anti-API scanners techniques that avoids reconstruction of original import table
Automatic decompilation and scrambling techniques in target application
Virtual Machine emulation in specific blocks of code
Advanced Mutator engine
SDK communication with protection layer 
Anti-disassember techniques for any static and interactive disassemblers 
Multiple polymorphic layers with more than 50.000 permutations
Advanced API-Wrapping techniques
Anti-monitors techniques against file and registry monitors
Random garbage code insertion between real instructions
Specialized protection threads
Advanced Threads network communication
Anti-Memory patching and CRC techniques in target application
Metamorphic engine to scramble original instructions
Advanced Entry point protection 
Dynamic encryption in target application
Anti-tracing code insertion between real instructions
Advanced Anti-breakpoint manager
Real time protection in target application
Compression of target application, resources and protection code
Anti-“debugger hiders” techniques 
Full mutation in protection code to avoid pattern recognition
Real-time simulation in target application
Intelligent protection code insertion inside target application
Random internal data relocation
Possibility to customize dialogs in protected application
Support of command line
Many many more...



  • Brak komentarzy
Podobne w tej kategorii