In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-02-27 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
Function
Virbox developer toolbox is a set of software encryption tools developed by Shield, which integrates shell tools, API documents and operation flow documents to facilitate software developers to use.
You can do this through the Virbox developer toolbox:
Encryption Protection of dll and exe
Prevent software from being reverse engineering, reverse assembling, reverse compiling
Software authorization control: time limit, time limit, limit function, limit device binding, etc.
Encryption of resource files: PDF, PPT, video, etc., to prevent copying
advantage
Virbox encryption scheme is used in conjunction with a new generation of encryption locks: elite 5 encryption locks. Elite 5 encryption lock is a product that can resist crazy decoding in the current encryption lock market. Think deeply about the previous generation of product Elite 4 encryption lock is still an excellent encryption product in the encryption market, Elite 5 encryption lock is a new upgrade, encryption technology and hardware are better than Elite 4.
Advantage 1: fragment code protection
Code transplantation is only simply used in the industry, and only developers invest a lot of energy in order to achieve certain results, so it has been stuck in the concept. In recent years, encryption lock manufacturers, including contemplation, have put forward the concept of "automatic code migration" and launched related products, but in practice, because it is also limited to hardware performance, the code that can be extracted is greatly limited. usually only a few instructions can be moved, so the improvement in security is limited. And this scheme is strictly limited by the encryption lock hardware specifications, the scalability is very low, the encrypted software can only completely rely on the encryption lock, can not achieve business changes (such as online trial, etc.).
Thoughtful "fragmented code execution" fundamentally solves the above problems, using mature code extraction technology to extract a large amount of code from the software and execute it in a secure environment after encryption confusion, combining Vibrox encryption engine, virtualization and driver technology to make the software execution process more secure.
Fragment code execution can be simply understood as breaking up software functions and executing them in a secure environment, making it impossible for crackers to start, which is a major breakthrough in the concept of software protection.
Advantage 2: fast encryption-Virbox Protector shelling tool
Virbox protector shelling tool is a set of high-strength automatic protection encryption tools developed by ourselves, which creatively introduces pre-analysis and automatic optimization engine, which effectively solves the problem of security and performance balance when virtualizing code protection. It integrates automatic code migration, confusion, shell encryption and data encryption, which can achieve extremely high protection intensity without programming.
Advantage 3: dynamic defense-anti-triad engine
Built-in R0 core state anti-black engine, based on × × behavior characteristics (anti-black database) anti-control means. Precision attack debugging, injection, memory modification and other × × behavior, from passive beating to active protection. Driver level anti-debugging, second kill common debugger (IDA Pro/WinDbg/OllyDbg/X64Dbg).
Advantage 4: customized SDK
The customized version of SDK has an independent developer PIN, key and certificate system, and each developer's SDK is different. There will be no general means of cracking.
Advantage 5: convenient remote upgrade
Remote upgrades can be upgraded through the D2C package without changing the software code.
Advantage 5: Internet experience
It can be controlled by cloud license or soft license without the need for encryption lock mode. Once encryption, multiple license forms are perfectly compatible. If your users do not want to use hardware, you can quickly switch to cloud lock or soft lock without changing the encryption scheme.
Advantage 6: strong hardware performance
Elite 5 has the fastest chip in the elite series so far, and its performance is particularly strong. Infineon provides a CC EAL5+-certified 32-bit ARM chip, the main frequency is as high as 24Mhz, the execution speed is up to 50DMIPS, the comprehensive performance is 3000 times higher than that of elite IV, and can perform more complex tasks. For the first time, it provides a storage space of up to 512K and can store up to 6000 pieces of license information.
Elite 5 uses the control lock plus user lock mode, and the control lock is used by the developer to encrypt the software and license the user lock. The software of the software developer of the user lock is sent to the software user. The first purchase requires the purchase of Elite 5's development kit for testing.
Application industry
At present, more than 10000 software developers have registered to use Virbox to encrypt software, almost in all industries. For example: building software, educational software and resources, game software, equipment software, financial software, visual control, medical software, surveying and mapping software, financial software, security software, VR, industrial control software, drawing software, etc. can be protected by Virbox encryption tools.
Supported development languages and binaries
C
C++
VB6.0
Delphi7 DeliphXE-XE10
BCB6.0
C#
.Net
Java
ARX (AutoCAD)
Unity3D
UE4
Resource files in all formats
Revit (plug-in)
Usage
After installation, register the Virbox LM account (you can click the button to register the account in the toolbox). After logging in to the developer's toolbox, download SDK to use.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.