googleba88693c99e7e8ce.html
WinLicense®
Łączy moc ochrony oprogramowania (jak Themida), z mocą zaawansowanej kontroli licencji. Oferuje szeroki zakres zaawansowanych i elastycznych technik, które pozwalają programistom na bezpieczną dystrybucję wersji testowych swoich aplikacji.

Trial/Licensing Features:
| Machine dependent keys | |
| SmartActivate® keys for elegant registration systems | |
| Multiple trial expiration types | |
| Possibility to combine several expiration types for trial and license keys | |
| Powerful engine to store the trial period in the system | |
| Complete SDK with more than 50 exported functions | |
| Full .NET SDK support | |
| Custom trial counters SDK for different developer’s needs | |
| Easy support to create your own licensing systems via web server | |
| Country locking for trial and license keys | |
| Trial extension keys to extend the trial in an expired application | |
| Text keys registrations | |
| File key registrations | |
| Registry keys registrations | |
| Independent password protection for either Trial or registered versions | |
| Expirable license keys | |
| Tracking and detection of stolen keys | |
| Customization for all trial/registration messages with possibility to include/exclude them from being displayed by WinLicense | |
| Embedded generators in GUI to create licenses, passwords and trial extensions keys | |
| Specific key generators can be automatically generated for every protected application | |
| Custom data field in license keys for different developer’s needs | |
| Database driven implementation to keep safe record of all your software, customers and licenses | |
Protection Features:
| Anti-debugger techniques that detect/fool any kind of debugger | |
| Anti-memory dumpers techniques for any Ring3 and Ring0 dumpers | |
| Different encryption algorithms and keys in each protected application | |
| Anti-API scanners techniques that avoids reconstruction of original import table | |
| Automatic decompilation and scrambling techniques in target application | |
| Virtual Machine emulation in specific blocks of code | |
| Advanced Mutator engine | |
| SDK communication with protection layer | |
| Anti-disassember techniques for any static and interactive disassemblers | |
| Multiple polymorphic layers with more than 50.000 permutations | |
| Advanced API-Wrapping techniques | |
| Anti-monitors techniques against file and registry monitors | |
| Random garbage code insertion between real instructions | |
| Specialized protection threads | |
| Advanced Threads network communication | |
| Anti-Memory patching and CRC techniques in target application | |
| Metamorphic engine to scramble original instructions | |
| Advanced Entry point protection | |
| Dynamic encryption in target application | |
| Anti-tracing code insertion between real instructions | |
| Advanced Anti-breakpoint manager | |
| Real time protection in target application | |
| Compression of target application, resources and protection code | |
| Anti-“debugger hiders” techniques | |
| Full mutation in protection code to avoid pattern recognition | |
| Real-time simulation in target application | |
| Intelligent protection code insertion inside target application | |
| Random internal data relocation | |
| Possibility to customize dialogs in protected application | |
| Support of command line | |
| Many many more... | |