googleba88693c99e7e8ce.html
WinLicense®
Łączy moc ochrony oprogramowania (jak Themida), z mocą zaawansowanej kontroli licencji. Oferuje szeroki zakres zaawansowanych i elastycznych technik, które pozwalają programistom na bezpieczną dystrybucję wersji testowych swoich aplikacji.
Trial/Licensing Features:
Machine dependent keys | |
SmartActivate® keys for elegant registration systems | |
Multiple trial expiration types | |
Possibility to combine several expiration types for trial and license keys | |
Powerful engine to store the trial period in the system | |
Complete SDK with more than 50 exported functions | |
Full .NET SDK support | |
Custom trial counters SDK for different developer’s needs | |
Easy support to create your own licensing systems via web server | |
Country locking for trial and license keys | |
Trial extension keys to extend the trial in an expired application | |
Text keys registrations | |
File key registrations | |
Registry keys registrations | |
Independent password protection for either Trial or registered versions | |
Expirable license keys | |
Tracking and detection of stolen keys | |
Customization for all trial/registration messages with possibility to include/exclude them from being displayed by WinLicense | |
Embedded generators in GUI to create licenses, passwords and trial extensions keys | |
Specific key generators can be automatically generated for every protected application | |
Custom data field in license keys for different developer’s needs | |
Database driven implementation to keep safe record of all your software, customers and licenses |
Protection Features:
Anti-debugger techniques that detect/fool any kind of debugger | |
Anti-memory dumpers techniques for any Ring3 and Ring0 dumpers | |
Different encryption algorithms and keys in each protected application | |
Anti-API scanners techniques that avoids reconstruction of original import table | |
Automatic decompilation and scrambling techniques in target application | |
Virtual Machine emulation in specific blocks of code | |
Advanced Mutator engine | |
SDK communication with protection layer | |
Anti-disassember techniques for any static and interactive disassemblers | |
Multiple polymorphic layers with more than 50.000 permutations | |
Advanced API-Wrapping techniques | |
Anti-monitors techniques against file and registry monitors | |
Random garbage code insertion between real instructions | |
Specialized protection threads | |
Advanced Threads network communication | |
Anti-Memory patching and CRC techniques in target application | |
Metamorphic engine to scramble original instructions | |
Advanced Entry point protection | |
Dynamic encryption in target application | |
Anti-tracing code insertion between real instructions | |
Advanced Anti-breakpoint manager | |
Real time protection in target application | |
Compression of target application, resources and protection code | |
Anti-“debugger hiders” techniques | |
Full mutation in protection code to avoid pattern recognition | |
Real-time simulation in target application | |
Intelligent protection code insertion inside target application | |
Random internal data relocation | |
Possibility to customize dialogs in protected application | |
Support of command line | |
Many many more... |