In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-02-21 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
The use of dongles for encryption protection of programs is a very mature encryption scheme. Currently on the market more common encryption lock: thoughtful elite 5, weibu, safenet. Domestic comparison of the old encryption lock company is thoughtful, thoughtful lock from elite 4, to the present elite 5, are relatively good products, encryption security is high, the use of good experience, cost-effective, more recommended this one.
How to encrypt the program flow with dongle:
1. Get the encryption SDK package.
2, use the dongle supporting the shell tool to shell the program directly.
3. Use control lock and write lock tool to make matching user lock.
4. Send encrypted programs and matching user locks to users.
Encryption lock authorization management
Elite 5 series encryption lock can realize software authorization management, remote upgrade and other functions.
1. Time limit function. Software is sold on a subscription basis, and at the end of the subscription, the software license can be upgraded by remote upgrade.
2. Network lock function. A lock of server is realized in the local area network, and other computers under the same local area network can also use software.
3. Limited function module. Limit sales of different functional modules of software.
Shell tools encrypt programs
Directly drag the exe or dll of the encrypted program directly to the shell tool, select the function to be encrypted, and select the protection method. Virbox Protector protects functions in four ways: code virtualization/code obfuscation/code fragmentation/code encryption.
Code fragmentation is the latest technology for thinking about independent intellectual property rights: based on LLVM and ARM virtual machine technology, a large amount of code is automatically extracted and moved into SS kernel mode module, which greatly reduces the threshold for use, no longer requires manual transplantation algorithms, portable algorithms increase from limited to almost unlimited, and supported languages are no longer limited to C. This is a comprehensive application of encryption technology. The effect is similar to breaking up software execution, so that hackers have no way to start. High security, suggest critical functions or call cryptographic lock methods; too much use will affect efficiency.
Code encryption, the code block as data, with the license encryption function stored, program execution to the function to verify the license and decryption, memory will not expose the complete code block.
Code virtualization: for X86 code: refers to the translation of machine code into a string of pseudo-code byte streams that are not recognized by machines and humans; in the specific execution, these pseudo-codes are translated and interpreted one by one, gradually restored to the original code and executed. The subroutine that translates the pseudocode and executes it is called a VM (like an abstract CPU). It takes the form of a function whose argument is the memory address of the bytecode. Because the implementation of virtual machine code and virtual machine CPU can be random design and random execution every time, and the code can change randomly every time, including some logical equivalent changes, various logic gates can be realized by referring to hardware N NAND gates NOT-AND, algorithm and access memory form changes, including mathematical non-equivalent changes, the code volume can almost expand to 100 to 10000 times, causing the machine to be unable to do algorithm to restore to the original logic. Code virtualization is characterized by moderate security and no impact on efficiency.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.