473,581 Members | 2,307 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Make stronger protection for your software products

SoftComplete Development Updates EXECryptor to v. 2.1.20

Software piracy! Cracked serial numbers! Thousands of commercial
products are posted on the warez sites and become available to all who
want have your software product and pay no money for your development
work! Shareware developpers look for good protection for their
products and create some protection themselves or find ready-made
tools. But there's no many programs really effective. And as a result
they soon find the stoles keys and product cracks on the hacker
Internet pages.
No solution ? There is .

EXECryptor is a powerful software tool that allows developers to
significantly increase software protection from reverse engineering,
analysis and modifications. Its main difference from other protection
tools is a brand new metamorphing code transformation technology used
in.
With EXECryptor the protected code block is disassembled into
nondeterminate transformations , effectively scrambling the visible
logical code structure. After the code transformation, it remains
executable and working as it is supposed to but it cannot be neither
analysed nor modificated.
There's no question about code encryption but only code
transformation. Some optional parts of code you transform becomes a
really painful exercise to analyze. Protected code blocks are always
in the executable state and they are executed as a transformed code.
Code restoration becomes an NP-hard problem.
EXECryptor has the innovative very powerful antidebug, antitrace and
import protection features.
EXECryptor allows to use short registration keys of 12/16 characters
long. It is based on new generation of HardKey algorithm -
cryptographical ly strong ultrashort digital signature.
The power of software protection with EXECryptor is proved out in
practice : in despite of a lot of tries, none of EXECryptor's 2.x
updates, protected by themselves is cracked since July 2004
(EXECryptor 2.0 has been released the 8 July 2004)
In addition to advanced protection features EXECryptor allows to
compress code and resources of your application.
EXECryptor is able to protect any 32bit PE executable files (exe, dll,
bpl, vxd, wdm). It has been tested with W95/98/ME/2000/NT/XP/2003.
SDKs are available for Delphi, C++Builder, Microsoft Visual C++, LCC,
PellesC, Visual Basic, PowerBasic and PureBasic.
What's new in this version :
- added SDK's and examples for support LCC, PellesC, PowerBasic and
PureBasic
- added new option: Delay DLL loading
- improved: wmvare/virtualpc/wine compatible mode
- improved: protection from inline patching
- improved: antidebug protection

EXECryptor is distributed electronically over the Internet; free trial
version is available at http://www.strongbit.com for evaluation.
The price of a single copy is 135.00 US Dollars / 99 EUR. There are
significant discounts available for site license buyers.
SoftComplete Development specializes in creating office utilities that
free users of doing routine tasks themselves and optimize different
computer processes. The company has been on the market since 1995, has
a solid programming team with over 10 years of experience for each
employee, and released over a dozen software applications to this
date.
System Requirements:
* Operating system: Windows 95, 98, ME, NT, 2000, XP, 2003
* RAM: 32 Mb
* Hard Disk: 2,5 Mb
Product Page: http://www.strongbit.com/execryptor.asp
Download: http://www.softcomplete.com/download/execryptor.zip
Buy Link: http://www.strongbit.com/order.asp
Jul 23 '05 #1
0 2010

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

9
2354
by: Howard | last post by:
I am currently looking at the various packages that are available for software protection. I have a particular question that I'd welcome your feedback on. Background info: I work for a company that develops software, and typically releases software SDKs. Development is in C++ using MS Visual C++. We need to apply software...
0
352
by: SoftComplete Development | last post by:
SoftComplete Development Updates EXECryptor to v. 2.1.20 Software piracy! Cracked serial numbers! Thousands of commercial products are posted on the warez sites and become available to all who want have your software product and pay no money for your development work! Shareware developpers look for good protection for their products and...
9
8503
by: Saso Zagoranski | last post by:
Hi! I have recently completed an application, written in C#. When I opened one of the files with a hex editor I was amazed by the lack of protection for the assemblies. My application uses SQL Server and during install it sets up tables needed in the application. I also use a simple protection system, which stores a string (an...
3
1120
by: DavidB | last post by:
What are people using to protect their VB.NET software ????
10
3655
by: David | last post by:
I would like to set up a copy protection scheme where the application must be provided with an unlock code before it can be installed. Any ideas for a relatively simply system for doing this ? I seem to remember something like reading PC BIOS, adding the current date and XORING with a fudge factor to create a code that the user rings up and...
7
1846
by: dm4714 | last post by:
Hi -- does anyone know of any good VB.NET software registration, protection and activation components. I guess I'm looking for something similar to http://www.ionworx.com/solutions.html
20
1702
by: Paul Bromley | last post by:
Not sure if I can ask the question in this forum - please let me know if it is better elsewhere. Does anyone know of a reasonably priced good copy protection program that will protect software on either a machine only or network range basis?? I have just found Shareguard that looks reasonably priced. My applications are for vertical market...
0
1857
by: dba | last post by:
Hi folks, I would just like to share with you SQL CodeSecure, a newly released database protection and auditing tool from SqlLabs: SQL CodeSecure provides ultimate protection from unauthorized creation, modification and deletion of database objects. It provides flexibility through various protection types and granularity at different...
12
2309
by: Pioneer | last post by:
Hi, I would be installing a desktop application on a standalone PC. How do I make sure that owner should not be ableto copy that and/or give it to other folks. In short, how to build measures to avoid piracy? User ID/Password is one of the ways. But that can anyway be shared. Thansk for your inputs. Regards,
0
8149
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. ...
0
8304
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that...
1
7899
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For...
0
6553
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then...
0
5364
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert...
0
3805
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in...
0
3827
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
1
2301
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
0
1138
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.