--winlicense interface function of shell artifact

Source: Internet
Author: User
Tags password protection

Winlicense provides the strongest and most scalable technology to enable developers to securely distribute trial and full versions of their software. The following is a description of the Winlicense interface function (Chinese)

I. Application information (application information)

After clicking on the Software option, a management module will appear, choose "Add" to add a program that needs to be encrypted, then fill in the information point "Update" and then select the one you just edited (or you can edit it before you need to protect it) OK.

Second, protection option (Protection options)

A total of 17 options, demo version of the RING0 protection is not available, other options as required, in addition to the option of compressing resources, the other options will reduce the amount of protection after the volume (winlicense after protection of large size).

third, code replacement (Codereplace)

This is a new technology to protect the application through the code replacement technique, can be arbitrarily extracted some of the program part of the code and replaced by the garbage code, the protected program will not be restored to usable code.

four, virtual machine settings (Vsan)

You can set the parameters of the virtual Api-wrapper, Entry Point virtualization, and the processor specifications parameters, which can be set according to your needs, related to the strength of the protection and the volume of the program after protection.

Five, trial limit settings (Trial settings)

If you need to set a trial limit, it's here. This option has been used by other encryption software should be very familiar with ASPR, EPE, arm, etc. have this function. Winlicense can provide you with the following limitations for your trial: Days expiration (expiry date): Fill in an integer value, rather than fill in 30 is 30 days after the trial expires; date expiration (expiration): This is the specific expiration date, For example, fill in 2016-10-20 is this day is the trial expires; executions (number of executions): Unit is the times, that is, fill in a certain value is the ability to execute a certain value, run time (execution): Each runtime unit is divided; Time (total uptime available): This option sets the exact total time (in minutes) that the application may run on all Windows users. Internal timers are not reset at the operating system restart. When the total elapsed time expires, the application can no longer run until an authorization file is obtained.

VI. Registration Settings (registration)

There are four kinds of registration authorization form: 1, Authorization file 2, registration Form Authorization 3, smartactivate authorization 4, text key. Four forms of registration can be selected, or multiple items can be selected. For the registration section, there are 4 options that need to be set:

Allow only hardware dependent (locked) Registrations: Locks the hardware, that is, the authorization file on one machine cannot be used on another machine. If you need to bind the hardware, this item should be ticked, and the hardware locked needs to be set.

Accept temporary keys (that expire): accepts temporary license files. This allows a restrictive authorization to be set in the registrar generated after protection.

Application only runs when registered: Protected applications are only allowed to run in the case of registration, no license files will be available to run, and are eligible for trial licensing protection without trial or trial version.

Clear Trial Info When registered: Clear trial information after registration, i.e. the original trial version becomes an unrestricted official version after the program has been authorized.

Seven, hardware lock (Hardware lock)

In the previous registration option, select Allow only hardware dependent (locked) registrations to set this key.

Locked hardware includes: CPU, BIOS, MAC address (NIC), HDD Serial (HDD serial number)

There are also the number of times that hardware changes are allowed: allowed**changes. A value of 0 means that hardware changes are not allowed, and 1 is allowed to change 1 times.

Eight, password protection (Password protection)

The protected application requires a password when it starts, nothing to say.

Nine, the Dialogue framed system (customized Dialogs)

The dialog box appears in the following situations: Error (Erro), information (informition), Warning (warnning). Then are the specific contents of the hint altogether 36.

These dialogs can be customized to make changes, find the plus sign in the front of the dialog tree, then click Expand and Double-click the contents of the dialog box to make changes. %daysleft: Hint of a few days remaining%execleft: Tips How many times are available%totaldays: Hint Total available days%TOTALEXEC: Hint total available times%expdate: Prompt available date, format: "Dd/mm/yyyy" (i.e. will not be available after a date)%name: Prompt for username in license%company: Prompt for company name in license%machineid: Prompt Hardware ID instance: According to the above parameters, if I want to customize the dialog box as follows (Winlicense support Chinese, Show normal on My machine)

1, the hint total available days, the remaining days, you can write:

This procedure is%totaldays days, you still have%daysleft days expire, please log in www.xxx.com contact the author.

2, Prompt hardware ID information, you can write:

The machine ID is:%machineid, please write it down and tell me that I will be able to obtain the authorization file.

3, non-authorized users, and prompted the native hardware ID, you can write:

Your authorization and native hardware ID do not match, please contact me to obtain a new authorization file. (Native Hardware ID:%machineid)

10. Advanced Options

Encrypt application: The item must remain selected.

Export Specific generators: The registrar that can generate the current protector.

Splash screen settings: Splash settings, you can set the splash screen dwell time or click with the mouse, other options as needed.

11. Protection (Protect)

After confirming that the parameters of the above options are set correctly, click the Yellow Protect button to start encrypting the program. The shell time is longer, between 30 seconds-5 minutes (in relation to the Protection option and machine configuration), and if the export specific generators is selected at that time, there is a random registration machine generated.

In addition, HPE offers Winlicense year-end promotional <8.5, plus 50 percent time-limited and free- of-charge iphone 6, IPad air and other good gifts!


--winlicense interface function of shell artifact

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.