Search

  • Home
  • Enigma Protector
  • Search
Skip to content

Category: Enigma Tutorials

Categories Enigma TutorialsSoftware Protection

Protect your shareware written in Python

Posted on 08/12/202008/12/2020 2,156 Views 3 Likes

Big thanks to Rémi Mevaere for the userful tutorial for protecting of Python files! Original tutorial link is there: https://www.sciences-physiques.net/555d13e4a9b34836bb4753192f14225c Introduction As you know, it’s a bit hard to protect python code. Cause it’s interpreted ; with a small modification of python source code you could extract all the code (even if it’s obfuscated). The […]

Categories Enigma TutorialsSoftware Protection

Files Virtualization and Portable Applications

Posted on 07/02/201907/02/2019 6,707 Views 11 Likes

This article describes how to use Virtual Box functionality that is available in our commercial solution Enigma Protector and freeware Enigma Virtual Box. How to make application portable and hide files from users. Virtual Box This is a function that allows to merge files (and registry keys) into single protected/packed executable such way that application […]

Categories Enigma TutorialsSoftware Protection

Protecting Windows Service Applications

Posted on 19/09/2018 4,048 Views 18 Likes

  Services are specific applications that (usually) run by system automatically, while startup, or by triggering of some event. Example of services: HTTPD (Apache), MySql/MSSQL (most of other database providers). The list of locally installed services can be viewed by executing services.msc command. Why Services are so specific? Services are being run by the system […]

Categories Enigma TutorialsSoftware Protection

Protecting Overlay and Self-test Applications

Posted on 12/09/201819/09/2018 4,519 Views 10 Likes

  We often receive support requests on guide how to protect overlay and self-test applications using Enigma Protector. In this tutorial we describe how to protect such files, what are these files and why special protection features and techniques are required. If you still have any questions, please send us email at support@enigmaprotector.com. What is overlay, […]

Categories Enigma TutorialsSoftware Protection

Protecting Xojo applications

Posted on 25/07/201808/08/2018 5,785 Views 5 Likes

Xojo (Formerly known as Real Basic) is easy to use Rapid IDE which is using enhanced BASIC as the main language to develop. Compiled Xojo executable file is using a set of libraries (aka Xojo runtime) which are required for application to work. Xojo developers have to distribute these libraries together with application in order […]

Categories Enigma TutorialsSoftware Protection

Protecting PowerBuilder Applications

Posted on 19/12/201303/07/2015 9,326 Views 42 Likes

In this tutorial we will describe how to protect simple PowerBuilder application (official site http://www.sybase.com/) against cracking, reverse engineering, disassembling and also we will embed such protection feature as licensing with software protection system Enigma Protector. We recommend to read this tutorial fully and apply all protection settings described there.

Categories Enigma Tutorials

Best ways to protect your software!

Posted on 28/07/201107/06/2016 4,898 Views 11 Likes

We’ve been asked many times what are the best way to protect software against cracking and reverse engineering with Enigma Protector? Here I will explain what are the best tricks to protect usual application. Many developers think that if they simply click “protect” button then protection program will do everything automatically, and there is no […]

Tags

Antivirus Detection application application virtualization Bundle Dll Dependences create license key download enigma enigma protector executable files executables False Detection False Positive Files Emulation Files Virtualization generate registration key hardware id hardware lock Hide Files key protection keys generating license infromation license key license limitations Licensing licensing system lock to computer lock to pc Make Portable Version obfuscation Portable Applications professional system protection protector registration key Registry Virtualization Remove Detection software software licensing software licesing software protection software virtualization Solve Antivirus False Detection Solve False Detection virtualization Wrong Detection

Categories

  • Enigma Tutorials
  • Enigma Update
  • Online Activation
  • Software Protection
  • SoftwareProtection.INFO
  • Enigma Protector
  • Support Forum