There are many questions from our customers on how to protect .NET applications against cracking and dumping. In this article we will try to describe all the weak moments and details in protection of such specific files. .NET files are rather different than the native files that can be compiled with C++, Delphi, Pascal and […]
Category: Software Protection
Protecting Delphi (Lazarus, FreePascal) Applications: From Simplest to Complex
Delphi (Lazarus, FreePascal) applications are most suitable for protection with Enigma Protector. Here we discuss about protection of native Windows applications only (including Executable files, Dynamic Link Libraries, ActiveX (OCX) components, Services etc), 32 and 64 bit files. Simple Protection This is the basic protection with almost no protection features enabled. This case is not […]
Protect your shareware written in Python
Big thanks to Rémi Mevaere for the userful tutorial for protecting of Python files! Original tutorial link is there: https://www.sciences-physiques.net/555d13e4a9b34836bb4753192f14225c Introduction As you know, it’s a bit hard to protect python code. Cause it’s interpreted ; with a small modification of python source code you could extract all the code (even if it’s obfuscated). The […]
Files Virtualization and Portable Applications
This article describes how to use Virtual Box functionality that is available in our commercial solution Enigma Protector and freeware Enigma Virtual Box. How to make application portable and hide files from users. Virtual Box This is a function that allows to merge files (and registry keys) into single protected/packed executable such way that application […]
Protecting Windows Service Applications
Services are specific applications that (usually) run by system automatically, while startup, or by triggering of some event. Example of services: HTTPD (Apache), MySql/MSSQL (most of other database providers). The list of locally installed services can be viewed by executing services.msc command. Why Services are so specific? Services are being run by the system […]
Protecting Overlay and Self-test Applications
We often receive support requests on guide how to protect overlay and self-test applications using Enigma Protector. In this tutorial we describe how to protect such files, what are these files and why special protection features and techniques are required. If you still have any questions, please send us email at support@enigmaprotector.com. What is overlay, […]
Protecting Xojo applications
Xojo (Formerly known as Real Basic) is easy to use Rapid IDE which is using enhanced BASIC as the main language to develop. Compiled Xojo executable file is using a set of libraries (aka Xojo runtime) which are required for application to work. Xojo developers have to distribute these libraries together with application in order […]
Protecting PowerBuilder Applications
In this tutorial we will describe how to protect simple PowerBuilder application (official site http://www.sybase.com/) against cracking, reverse engineering, disassembling and also we will embed such protection feature as licensing with software protection system Enigma Protector. We recommend to read this tutorial fully and apply all protection settings described there.
Register ActiveX/COM Components without Administrator Privileges
This tutorial describes how ActiveX/COM components (*.dll, *.ocx) can be registered without Windows administrator privileges and without calling of regsvr32. This information is mainly interesting for Visual Basic developers who usually often use ActiveX components. We provide commercial (Enigma Protector) and freeware (Enigma Virtual Box) solutions for files and registry virtualization.
Software Protection: Protecting MSI Files with Enigma Protector
Windows Installer File (MSI) files are not executable files, and can’t be protected directly with Enigma Protector. Below I will show an example, how to protect it anyway. The Enigma Protector supports protection of executable files only, so initially we will make an executable file from our MSI installer.