In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-04-06 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
Virbox provides products for Unity encryption code and resources, protects code from decompilation, protects resources from being extracted, provides products with Unity encryption code and resources, protects code from decompilation, protects resources from being extracted.
Unity3D code encryption background
Unity3D mainly uses C# syntax and open source mono to run the developer's code logic, all code is not compiled to EXE, but is located in {APP}\ build\ game_Data\ Managed\ Assembly-CSharp.dll. And the principle of mono implementation is compatible with Microsoft. NET Framework, but the implementation principle is completely different. The traditional .NET Framework shelling is completely invalid, because Assembly-CSharp.dll is neither a dynamic library in PE format nor a dynamic library in .NET, which cannot be loaded from .NET Framework, but is interpreted and executed by the C # script in Assembly-CSharp.dll read by mono.dll.
Think deeply about the independent development of Unity3D encryption scheme
Virbox Protector encrypts Assembly-CSharp.dll without manually encrypting Assembly-CSharp.dll code. Mono code is compiled automatically, and Assembly-CSharp.dll code is decrypted on demand. Only when called, it will be decrypted in memory. If not, all codes cannot be decrypted at once. One-click encryption code logic, can not be decompiled, cannot dump memory. Do not reduce the number of game frames, with its own anti-black engine, drive-level anti-debugging, seconds kill all debuggers on the market.
Unity3D resource encryption
The main game resources of Uinty3D are in resources.assets, and everything in the game under the resources folder will be placed here. DSProtector tools can encrypt resource files such as .ress and resources in Unity software to prevent illegal extraction of resources in software or games.
Unity3D Android encryption scheme
Support Unity3D encryption scheme: according to the characteristics of Unity3D, upgrade the traditional encryption method, effectively prevent Dump memory decryption, and achieve real security.
1. High security: high reinforcement strength, effective against a variety of decompilation and debugging tools, prevent shelling
two。 Multi-architecture support: support multiple CPU architectures such as arm32, arm64, x86, x64
3. Extremely fast and convenient: provide tools and command line operation, compile and shell integration quickly
One-button encryption, secure and convenient
Virbox Protector can directly encrypt the entire generation directory of Unity3D programs, protect the main code logic of Unity from being decompiled, and protect the legitimate rights and interests of software developers to the maximum extent.
Flexible authorization control to prevent software from being copied at will
Complete authorization scheme, which supports cloud authorization, soft lock authorization, USB encryption lock authorization, network lock authorization, time limit, number of times, and network concurrency.
Dynamic protection, anti-black engine
Driver level anti-debugging / anti-injection and anti-hook, memory protection
The functions implemented by the anti-triad engine are:
1. Driver-level anti-debugging, anti-injection and anti-hook, effectively against Ollydbg, Windbg and other debugging tools
2. Memory protection, effective protection of memory data information can not be read and modified
3. Know your software pirated data clearly, and realize real-time statistics of plug-in, cracking and pirated data.
4. To take the initiative to crack down on pirated software and counteract it.
Learn more: http://lm.virbox.com
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.