UseVirbox ProtectortheJavaThere are two ways to encrypt items, one is toWarpacket encryption, one is forJarpackage encryption. Virbox Protectorboth file formats are supported for encryption and can be encrypted for parsingClassof the fileJava.exe, and can implement the project source code binding development equipment, prevent the deployment to the client server project is a whole copy.
two ways to encryptWar Packet Encryption
when your project is not completed, it is not appropriate to use the war file, because your class will often change because of debugging, such as to delete, create a war file is very uncomfortable, preferably your project has been completed, do not change, then hit a War Package, this time a war file is equivalent to a Web application, and the jar file is to encapsulate the class and some related resources in a package for easy reference in the program.
Jar Package Encryption
When writing Java Code, it is easy to program, often referencing a method that someone has already implemented, usually encapsulated into a jar package, which we simply introduce into Eclipse when we write . the jar package has a known jar package and its own exported jar package .
Encryption Process
How do we encrypt known jars or export our own jar packages and use them for others? The following is an introduction to the simple encryption process.
WarPackage Encryption Process
1. Pack a War package
2. Unzip the War pack
3. on java.exe Packers
4. Encrypt the class file
JarPackage Encryption Process
1. java.exe Packers
2. encrypt the Jar file
Detailed encryption process document download:
Https://pan.baidu.com/s/1c2KtyBd7e9oRgZXxdDQUig
Video tutorial:https://sense.udesk.cn/hc/articles/60709
Encryption Security Technology:
L Virtual Machine Shell : Elite 5 Shell Protection Tool, innovative pre-analysis and automatic optimization engine, effectively solves the security and performance balance of virtualization protection code.
L Fragment Code Execution : Using the Code extraction technology in its mature shell, extracting a large number of large pieces of code, encryption confusion in the security environment to execute, to minimize the encryption lock the underlying technology and functionality of the dependence, while a large number of large-scale migration to ensure a higher degree of security.
l virbox Cryptographic Compilation Engine : Set compilation, confusion and other security functions in one, because in the compilation phase of intervention, can optimize the space is universal virtualization technology can not be compared to the code, variable confusion degree also has a fundamental improvement.
L anti-Black engine : Built-in R0 level core mentality anti-black engine, based on hacker behavior characteristics (anti-black database) counter-method. Precision strike debugging, injection, memory modification and other hacker behavior, from passive beaten to active protection.
Two ways to encrypt Java code to prevent decompile