Features of shell encryption tools

Source: Internet
Author: User

1Three encryption methods are used: shell, embedding, and internal/external combination.

ShellThe so-called shell is the encryption tool added to the encryptedProgram. The shell is first executed when the encryption program starts. Check the existence and consistency of hardware dogs. If the corresponding hardware dog exists, it enters the entrance of the original program; otherwise, the program is terminated. The shell is executed only once when the encryption program is started.

EmbeddedThe so-called embedding refers to the process in which the encryption tool embeds a public program in the encrypted program. The encryption program executes this public program at a certain frequency throughout the runtime, this program checks the existence and consistency of hardware dogs. If the corresponding hardware dog exists, execute the original program; otherwise, terminate the program. This encryption method is optional.

Internal and external integrationIf the encrypted program has called the interface function provided by rainbow world, the shell notifies the interface function whether the shell program has been executed to prevent the shell program from being skipped. If the shell program is not executed, it is terminated.

2. data files such as DBF, BMP, and jpg can be encrypted.

3. You can flexibly limit the time of use in four ways. If you select a limited time, the program will occupy the 10-byte storage area of the hardware dog. Please specify the first address of the storage area and ensure that this part of the storage area is not modified by other applications.

A. You can specify the term of use. If the term of use has expired or the system date has regressed, the encrypted program cannot run;

B. The number of times of use can be specified. If the number of times of use is reached or the system date is regressed, the encrypted program cannot run;

C. You can specify the total running time. If the cumulative running time of the Program reaches the specified value or the system date is found to be regressing, the encrypted program cannot run;

D. You can specify the relative term of use after the program runs for the first time. If the term of use has expired or the system date is found to have regressed, the encrypted program cannot run.

4. You can select the allow or disable Parallel Port Sharing device to set whether multiple PCs can share one parallel port. The Parallel Port Sharing device is a hardware device that connects multiple PCs to share a single parallel port.

5. You can choose whether to verify the password stored in the hardware dog. Developers can use the developer tool provided by rainbow World Corporation (utility \ dogedt32.exe) to set passwords.

6. You can customize the prompt information displayed to the user when a hardware dog error occurs. You can also choose not to display the prompt information.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.