In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-16 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
There are two ways to encrypt Java projects using Virbox Protector, one is to encrypt War packets, and the other is to encrypt Jar packets. Virbox Protector supports both file format encryption, can encrypt the java.exe used to parse class files, and can bind the project source code to the development device to prevent the project deployed to the client server from being copied as a whole.
Two encryption methods War packet encryption
When your project is not completed, it is not suitable to use war files, because your classes will be changed frequently due to debugging and so on, so it is very uncomfortable to delete and create war files back and forth. It is best that your project has been completed and does not change, so make a war package. At this time, a war file is equivalent to a web application. The jar file encapsulates the class and some related resources into a package for easy reference in the program.
Jar packet encryption
When writing java code, in order to facilitate programming, we often refer to methods that others have already implemented, which are usually encapsulated into jar packages. When we write it, we just need to introduce it into Eclipse. The Jar package has a known jar package and a self-exported jar package.
Encryption process
How can we encrypt known jar or self-exported jar packages and give them to others to use? The following is an introduction to the simple encryption process.
War packet encryption process 1. Package War package
2. Decompress the War package
3. Shell java.exe
4. Encrypt class files
Jar packet encryption process 1. Shell java.exe
two。 Encrypt Jar files
Encryption security technology:
Virtual machine shell: the shell protection tool of Elite 5 innovatively introduces a pre-analysis and automatic optimization engine to effectively solve the problem of security and performance balance when virtualizing code protection.
L fragmentation code execution: using the code extraction technology in its mature shell, a large amount of code is extracted and executed in a secure environment after encryption confusion, so as to minimize the dependence on the underlying technology and functions of the encryption lock. at the same time, a large number of large-scale transplantation ensures higher security.
L Virbox encryption compilation engine: it integrates security functions such as compilation and obfuscation. Due to the intervention in the compilation phase, the optimizable space is incomparable with general virtualization technology, and the degree of confusion of code and variables has been fundamentally improved.
L anti-black engine: built-in R0 core state anti-black engine, based on × × behavior characteristics (anti-black database) countermeasure. Precision attack debugging, injection, memory modification and other × × behavior, from passive beating to active protection.
Detailed encryption process and java project examples, toolkits, etc. Download address: https://pan.baidu.com/s/1c2KtyBd7e9oRgZXxdDQUig
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.