Professional Solution For You ...
WELCOME TO MY WEBSITE
Copyright © 2013 by "PRASiD" All Rights reserved
4.10 Build 20140507
- Bug fixed protecting executables with shared sections
- Bug fixed handling invalid import, export and reloc directories
- Some problems fixed with Risc Virtual Machine
- Bug fixed protecting particular Rad Studio files
- Bug fixed with loading virtual content from packaging files of Virtual Box feature
- Bugs fixed in samples and ide files of keys generator for C#
- Bug fixed with memory leaks in loader
- Bug fixed with option Checkup - Control sum
- Bug fixed protecting dll files
4.00 Build 20140304
- Added new RISC virtual machine
- Added new vm markers vm_risc_begin and vm_risc_end
- Improved virtualization for instructions ror, rol, inc, dec
- Bug fixed virtualizing instructions sar, sal, shr, shl, adc, sbb, scas
- Improved handling of trial Enigma API in registered mode
- Improved trial control while application is running
- Improved compatibility with madExcept package
- Improved handling of files with sections of zero virtual size
- Bug fixed with changing of HDD Serial (Compatibility Level 4 should be enabled in Miscellaneous - Others)
- Bug fixed processing relocation elements in VM markers
- Bug fixed using VM markers for Visual Basic programs
- Bug fixed detecting Windows version for Windows 8+
- Bug fixed with VC/VC64 keygen examples
- Bug fixed with declaration of TKeyInformation for Visual Basic
The Enigma Protector includes a wide range of unique features aimed at protecting executable files from illegal copying, hacking, modification, and analysis. The supported formats include almost all types of 32- and 64-bit executable files (exe, src, dll, ocx, bpl, etc.) and .NET files created using various development tools, such as MS Visual Studio C#/C++/VB/VB.NET, Borland Delphi/C++, FreePascal, MASM, TASM and others. The protected files can be run on all versions of Windows 95/98/ME/2000/XP/2003/Vista/2008/Seven and Windows 8.
The Enigma Protector will make your software resistant to cracking, and thus will increase your sales. The use of attack-proof cryptoalgorithms for registration key generation will make it impossible for others to reconstruct or reproduce the registration key generator for your software. Various methods of code obfuscation, mutation and virtualization will help protect your application from hacking, modifying, disassembling, illegal retrieval of unique functions and data, etc.
A range of features and technologies to help protect the executable file from hacking, analysis, modification and disassembly. A Virtual Machine technology enables part of the application and protection code to be executed in its own virtual CPU, which makes the code practically impossible to analyze.
The licensing system allows prompt integration of registration key verification functions, binding license to a specific computer, limiting the term of license. Rich functionality of the licensing system allows you to create your own key generators and to use the built-in or easily customizable CGI key generators.
The unique technology which allows combining the files used by your application into a single module without loss of efficiency. This function supports all kinds of files, including dll, ocx, mp3, avi, etc. Virtual Box will protect your files and prevent them from being copied and used in third-party products.
I, personally hirded developer and works various firm. I know C#, .NET, ASP, ASP.net, PHP, Delphi. You can ask use about any issue with development. For mor info please check here . . .