Risco Software, Inc
|FastCube VCL 2 released|
Desktop OLAP components set which supports Delphi/C++Builder/RAD Studio from version 7 up to XE6
I. Revolutionary improvements in grids view and work
II. Optimized and advanced Data analysis
III. New Cubes possibilities
IV. Global filter
V. And much more...
Get more info here
|Want to know more ?|
Total 1 product
|Developer Tools > Developer Tools > Software Protection|
A1 UltraProtect v.1.09f||SW
||12 May 2006
|By Risco Software, Inc. Protects Delphi and BCB compiled application against piracy, using public keys encryption algorithms (RSA) to create and verify the registration keys and unlock some RSA key locked code, it has embedded cryptor against dump and unpacker. It also has many anti debug tricks. With specialized API system, mutual communication between loader and application is also can be achieved.
- RSA1024 - With RSA keys system,cracker can not write a KeyGen(or KeyMaker) of your production without the RSA private key (the RSA private key only in the author's hand). And your can specify some code to be locked by the RSA keys,so is the cracker have not the proper key.dat on the proper machine,the code protected can not decrypt.
- Polymorph - Polymorph decryption routines and several encrypted layers. The code being protected varied every time your protect your application.
- Embedded cryptor - You can specify the place in your application to embed the inner cryptor. With the embedded cryptor,your application can not be cracked even though the cracker know the original entry point (OEP) and rebuild your Import table.
- Mutual Communication - API system which allows communication between application and loader, loader can call some of the application's export function, and the application can call the function the protected system provided.
- Anti patch/loader - Protects your files against patching/modifications and disassembling
- Anti-Soft ice - Numega Softice detection and Frogsice detection
- Anti debug, dump, trace... Anti-debugger & Monitor like W32Dasm, SoftIce, TRW 2000, Turbo Debugger, Sourcer, Filemon, ExeSpy, ResSpy, RegMon, Memory Monitor etc.
- Runtime code encryption Important parts of your code can be protected individually, providing extra protection against memory patches.
- System-specific licenses License keys may be locked to a specific system by checking the computer's unique fingerprint (such as harddisk ID, CPU ID etc).
- Stolen keys keeping of the database and checkup of "stolen" (illegal) registration keys.
- Trial setting possibility to create evaluation (trial) versions, that limit application functions based on the number of runs left.
|Download: CB1 CB2k6 CB3 CB4 CB5 CB6 D2 D2005 D2006 D3 D4 D5 D6 D7
|News from our Sponsors|
Stellar Phoenix Database Repair for MySQL
Stellar Phoenix Database Repair for MySQL is professional yet simple utility to recover data from damaged or corrupt InnoDB tables and MyISAM tables of MySQL databases. The software efficiently recovers tables and other important objects of MySQL database such as queries of views, relations, primary keys, etc. The tool can perform recovery on Linux platform as well. With its interactive GUI, this software supports MySQL 6.x, 5.x, 4.x, and 3.x more...
Coding in Delphi
Coding in Delphi is a new programming book by Nick Hodges that covers a variety of powerful Delphi programming features and techniques including Generics, Interfaces, Exception, Handling, Anonymous Methods, Collections, RTTI, Enumerators, Attributes, Dependency Injection and Unit Testing more...
Advertising on Torry's Delphi Pages