Services are specific applications that (usually) run by system automatically, while startup, or by triggering of some event. Example of services: HTTPD (Apache), MySql/MSSQL (most of other database providers). The list of locally installed services can be viewed by executing services.msc command. Why Services are so specific? Services are being run by the system […]
We often receive support requests on guide how to protect overlay and self-test applications using Enigma Protector. In this tutorial we describe how to protect such files, what are these files and why special protection features and techniques are required. If you still have any questions, please send us email at firstname.lastname@example.org. What is overlay, […]
Xojo (Formerly known as Real Basic) is easy to use Rapid IDE which is using enhanced BASIC as the main language to develop. Compiled Xojo executable file is using a set of libraries (aka Xojo runtime) which are required for application to work. Xojo developers have to distribute these libraries together with application in order […]
Tutorial describes the most common steps to configure Enigma Protector to use online activation features. Enigma Protector – http://enigmaprotector.com/en/about.html Online Activation Panel – http://enigmaprotector.com/en/aboutoap.html
In this tutorial we will describe how to protect simple PowerBuilder application (official site http://www.sybase.com/) against cracking, reverse engineering, disassembling and also we will embed such protection feature as licensing with software protection system Enigma Protector. We recommend to read this tutorial fully and apply all protection settings described there.
This tutorial describes how ActiveX/COM components (*.dll, *.ocx) can be registered without Windows administrator privileges and without calling of regsvr32. This information is mainly interesting for Visual Basic developers who usually often use ActiveX components. We provide commercial (Enigma Protector) and freeware (Enigma Virtual Box) solutions for files and registry virtualization.
Windows Installer File (MSI) files are not executable files, and can’t be protected directly with Enigma Protector. Below I will show an example, how to protect it anyway. The Enigma Protector supports protection of executable files only, so initially we will make an executable file from our MSI installer.
We have been asked about the ability of our application virtualization solutions to bundle numerous dynamic link library (dll) files for Qt programs (http://qt.nokia.com/) compiled for Windows and in this post I will show how to bundle/merge Qt runtime libraries to the single executable. Application Virtualization in this context means emulation of files (and registry) […]
Microsoft has released developers edition of the Windows 8 that is planned to release someday in 2012, and we, as software protection vendors, have to be sure our products are working correctly there too.
Software Licensing is the most common way used for selling commercial software in the internet and also for locking usage of the program to the particular user or computer. In this post I will explain what is Software License and how to apply it to existing software using Enigma Protector.