473,396 Members | 1,923 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

Make stronger protection for your software products

SoftComplete Development Updates EXECryptor to v. 2.1.20

Software piracy! Cracked serial numbers! Thousands of commercial
products are posted on the warez sites and become available to all who
want have your software product and pay no money for your development
work! Shareware developpers look for good protection for their
products and create some protection themselves or find ready-made
tools. But there's no many programs really effective. And as a result
they soon find the stoles keys and product cracks on the hacker
Internet pages.
No solution ? There is .

EXECryptor is a powerful software tool that allows developers to
significantly increase software protection from reverse engineering,
analysis and modifications. Its main difference from other protection
tools is a brand new metamorphing code transformation technology used
in.
With EXECryptor the protected code block is disassembled into
nondeterminate transformations, effectively scrambling the visible
logical code structure. After the code transformation, it remains
executable and working as it is supposed to but it cannot be neither
analysed nor modificated.
There's no question about code encryption but only code
transformation. Some optional parts of code you transform becomes a
really painful exercise to analyze. Protected code blocks are always
in the executable state and they are executed as a transformed code.
Code restoration becomes an NP-hard problem.
EXECryptor has the innovative very powerful antidebug, antitrace and
import protection features.
EXECryptor allows to use short registration keys of 12/16 characters
long. It is based on new generation of HardKey algorithm -
cryptographically strong ultrashort digital signature.
The power of software protection with EXECryptor is proved out in
practice : in despite of a lot of tries, none of EXECryptor's 2.x
updates, protected by themselves is cracked since July 2004
(EXECryptor 2.0 has been released the 8 July 2004)
In addition to advanced protection features EXECryptor allows to
compress code and resources of your application.
EXECryptor is able to protect any 32bit PE executable files (exe, dll,
bpl, vxd, wdm). It has been tested with W95/98/ME/2000/NT/XP/2003.
SDKs are available for Delphi, C++Builder, Microsoft Visual C++, LCC,
PellesC, Visual Basic, PowerBasic and PureBasic.
What's new in this version :
- added SDK's and examples for support LCC, PellesC, PowerBasic and
PureBasic
- added new option: Delay DLL loading
- improved: wmvare/virtualpc/wine compatible mode
- improved: protection from inline patching
- improved: antidebug protection

EXECryptor is distributed electronically over the Internet; free trial
version is available at http://www.strongbit.com for evaluation.
The price of a single copy is 135.00 US Dollars / 99 EUR. There are
significant discounts available for site license buyers.
SoftComplete Development specializes in creating office utilities that
free users of doing routine tasks themselves and optimize different
computer processes. The company has been on the market since 1995, has
a solid programming team with over 10 years of experience for each
employee, and released over a dozen software applications to this
date.
System Requirements:
* Operating system: Windows 95, 98, ME, NT, 2000, XP, 2003
* RAM: 32 Mb
* Hard Disk: 2,5 Mb
Product Page: http://www.strongbit.com/execryptor.asp
Download: http://www.softcomplete.com/download/execryptor.zip
Buy Link: http://www.strongbit.com/order.asp
Jul 23 '05 #1
0 1979

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

9
by: Howard | last post by:
I am currently looking at the various packages that are available for software protection. I have a particular question that I'd welcome your feedback on. Background info: I work for a company...
0
by: SoftComplete Development | last post by:
SoftComplete Development Updates EXECryptor to v. 2.1.20 Software piracy! Cracked serial numbers! Thousands of commercial products are posted on the warez sites and become available to all who...
9
by: Saso Zagoranski | last post by:
Hi! I have recently completed an application, written in C#. When I opened one of the files with a hex editor I was amazed by the lack of protection for the assemblies. My application uses SQL...
3
by: DavidB | last post by:
What are people using to protect their VB.NET software ????
10
by: David | last post by:
I would like to set up a copy protection scheme where the application must be provided with an unlock code before it can be installed. Any ideas for a relatively simply system for doing this ? I...
7
by: dm4714 | last post by:
Hi -- does anyone know of any good VB.NET software registration, protection and activation components. I guess I'm looking for something similar to http://www.ionworx.com/solutions.html
20
by: Paul Bromley | last post by:
Not sure if I can ask the question in this forum - please let me know if it is better elsewhere. Does anyone know of a reasonably priced good copy protection program that will protect software on...
0
by: dba | last post by:
Hi folks, I would just like to share with you SQL CodeSecure, a newly released database protection and auditing tool from SqlLabs: SQL CodeSecure provides ultimate protection from unauthorized...
12
by: Pioneer | last post by:
Hi, I would be installing a desktop application on a standalone PC. How do I make sure that owner should not be ableto copy that and/or give it to other folks. In short, how to build measures to...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.