Examples with Enigma Protector
Functionality
Enigma Protector offers a variety of features to protect software and manage its usage
- Machine Code Compression and Encryption: Reduces the size of the program module without affecting functionality and complicates analysis by crackers.
- Strong Registration Key Generation: A user-friendly interface for creating and verifying registration keys with secure algorithms like RSA with up to 512-bit key length.
- Enigma API: A special API set for communication between the module and the Enigma loader. It provides comprehensive information about registration keys and current trial parameters.
- System Clock Control: Prevents users from manipulating the system clock to extend time-based trial limits.
- Hardware Locking: Generates registration keys that only work on a specific computer, preventing usage on other systems.
- Time-Limited Registration Keys: Allows limiting the usage duration of the registered version of a module.
Protection Mechanics
Implementation of numerous techniques to protect against cracking attempts. The protection extends to all executable Windows 32/64 PE files created with various Win32/Win64 compilers such as C++, Delphi, MASM, Visual Basic, Free Pascal, FoxPro, Power Basic and TASM.
- Anti-Debugger Tricks: Prevents the simultaneous execution of debug tools with the protected software.
- Checksum Verification: Monitors if any modifications have been made to the machine code, which could indicate tampering.
- Startup Password: Restricts access to the software to authorized user groups.
- Monitoring of External Files and Processes: Ensures that no unauthorized modifications or processes are executed that could affect the software.
- File Analyzer Deception: Conceals the signature of the protection system from file analysis tools like PEiD. Additional code at the Module Entry Point to deceive analysis tools.
- Preservation of Original File Size: Maintains the size of the protected module so that it has the same size as the original file.
- Extended Protection against Forced Imports: Protects the import table of the protected module by erasing it from memory.
- WinAPI Emulation: Redirects some system WinAPI functions to emulated internal Enigma functions.
- Inline Patching: Utilizes an anti-inline-patching technology that checks the integrity of the protection code. If changes are detected in the protection code, the file execution is immediately terminated without prompting.
- Protected Strings: Hides strings from reverse engineering. The Enigma Protector extracts the required strings only when necessary, instead of keeping them in the process memory.
Storage and Encryption
Enigma Protector offers detailed functions for storing and encrypting registration data
- Storage in Windows Registry or External Files: Registration information can be stored in the Windows registry or in external files to protect it from unauthorized access.
- Encryption of Registration Information: Registration data can be encrypted to protect it from tampering. Furthermore, the encryption can be bound to the user's hardware to prevent registration on other devices.
- Hardware-ID Encryption: The registration information can also be encrypted with the user's hardware ID. This ensures that the information only works on the original computer on which it was created. If the hardware ID is changed, the registration becomes invalid and the application must be registered again.
- Registration Dialog: Allows adding custom registration dialogs to the executable without changing the main code. This provides a flexible way to prompt users for their registration information.
Advanced Protection Features
To further enhance protection the Enigma Protector offers additional features:
- Verification of Windows Version and Installed Services: Ensures that the software runs only on authorized systems.
- Virtual Machine Detection: Prevents the software from running in virtual machines, making debugging more difficult.
- Import Table Modification: Prevents analysis by obfuscating the libraries used.
- Splash Screen: The Enigma Protector allows developers to add a custom splash screen, which is displayed when the respective application is started. Various configuration options and API functions allow developers to flexibly control the display of the splash screen and adapt it to their needs.
License Management
Enigma Protector includes several tools for managing licenses
- License Manager: Stores and manages licenses for registered users. This tool is user-friendly and allows creating customer records and generating licenses.
- Mailer: The Enigma Mailer enables the automatic generation and sending of e-mails to registered customers, including notifications of software updates and registration information. In addition, emails can be managed according to categories such as Outbox, Sent Mail and Trash.
Key Generation and Registration
Enigma Protector offers a flexible environment for creating and verifying registration keys.
- Hardware-Locking: Generates registration keys that only work on a specific computer by binding them to the device's hardware.
- Time-Limited Keys: Sets limits based on the number of executions, days or a specific time for the software.
Sources
Enigma Protector
Your opinion is important – please leave a comment!
0 Comments