Welcome![Sign In][Sign Up]
Location:
Search - PE Protect

Search list

[Other《软件加密技术内幕》[配套光盘]

Description: 此为本书的配套光盘.本书结合实例,重点讲述了软件加密技术及其实施方案,以帮助程序员更好地保护自己的软件。书中介绍了相关系统的底层知识,例如,PE格式深入分析,调试API应用,未公开技术SEH的深入研究等,从而使读者在了解这些底层知识后,可以应用到自己的软件保护方案如各种反跟踪技术的实现中。本书还首度公开了如何编写加壳软件,以及如何将壳与程序融合在一起等一些热门技术。本书由加密解密技术界一流高手共同打造,读者将从本书中获得许多极具商业价值的内幕技术,是专业开发人员不可多得的一本好书。-this be supporting the CD. The book combines examples highlight of the software encryption technology, and its implementation program to help programmers to better protect their software. The book introduced the relevant knowledge of the underlying system, for example, PE format for in-depth analysis and debugging API application, but SEH undisclosed technology in-depth research, thus allowing readers to understand the underlying knowledge, can be applied to their own software to protect various programs, such as anti-tracking technology realization. The book is also the first time publicly how to prepare shell software, and how to shell and procedures for the integration of some other hot technology. The book by the encryption and decryption technology community together to create a first
Platform: | Size: 3668598 | Author: 陶立欣 | Hits:

[Other《软件加密技术内幕》[配套光盘]

Description: 此为本书的配套光盘.本书结合实例,重点讲述了软件加密技术及其实施方案,以帮助程序员更好地保护自己的软件。书中介绍了相关系统的底层知识,例如,PE格式深入分析,调试API应用,未公开技术SEH的深入研究等,从而使读者在了解这些底层知识后,可以应用到自己的软件保护方案如各种反跟踪技术的实现中。本书还首度公开了如何编写加壳软件,以及如何将壳与程序融合在一起等一些热门技术。本书由加密解密技术界一流高手共同打造,读者将从本书中获得许多极具商业价值的内幕技术,是专业开发人员不可多得的一本好书。-this be supporting the CD. The book combines examples highlight of the software encryption technology, and its implementation program to help programmers to better protect their software. The book introduced the relevant knowledge of the underlying system, for example, PE format for in-depth analysis and debugging API application, but SEH undisclosed technology in-depth research, thus allowing readers to understand the underlying knowledge, can be applied to their own software to protect various programs, such as anti-tracking technology realization. The book is also the first time publicly how to prepare shell software, and how to shell and procedures for the integration of some other hot technology. The book by the encryption and decryption technology community together to create a first
Platform: | Size: 9389056 | Author: 陶立欣 | Hits:

[Process-ThreadPEEncrypt

Description: PEEncrypt PE加密程序Delphi源代码,能保护你的PE文件-PEEncrypt PE encryption Delphi source code, to protect your PE file
Platform: | Size: 402432 | Author: 吴铭 | Hits:

[Windows DevelopPloyBox

Description: Anskya Polymorphic Packer V 1.3 Code By Anskya Thank:Aphex,Madshi,Gregory,~LOM~ Big Thank:Aphex,sforever,zxxfox,AngleAngel GST Http://www.Godexp.com Web Http://www.Anskya.net Explanation: Produce and encrypt the key with grade, the additional data are measured the file protect of PE is compressed.-Anskya Polymorphic Packer V 1.3Code By Anskya Thank: Aphex, Madshi, Gregory, ~ LOM ~ Big Thank: Aphex, sforever, zxxfox, AngleAngelGST Http:// www.Godexp.comWeb Http:// www.Anskya.netExplanation:Produce and encrypt the key with grade, the additional data are measuredthe file protect of PE is compressed.
Platform: | Size: 505856 | Author: jackson | Hits:

[Crack HackXJEXTProtector

Description: 该程序用VB构建,程序是用重新构建PE并在内存区域运行而不进行输出的方式保护您的应用程序不被破解。可以将程序放在任何地方运行,不受限制。一旦有“不法分子”在加密的程序后面加一段恶意代码,程序就将弹出提示禁止运行,保证程序不被篡改。-PE used to rebuild and run in the memory region for export rather than to protect your application will not be broken. Procedures can be run on any place, without restriction. Once the " lawless elements" in the encrypted section of the procedures followed by malicious code, the program would prohibit the operation of the pop-up prompts to ensure that procedures are not being tampered with.
Platform: | Size: 2720768 | Author: XiaoJSoft | Hits:

[Windows DevelopVMProtect

Description: virtual machine protect, best pe protector in the net , allows you to wrap every exported function
Platform: | Size: 1072128 | Author: croner | Hits:

[Delphi VCLexe-protector

Description: exe 文件PE开头保护 加密器 44 文件PE开头保护 加密器-exe file encryption devices to protect the beginning of PE
Platform: | Size: 242688 | Author: | Hits:

[Crack Hackpe

Description: PE 加壳保护通过所有世界杀毒软体启动病毒程序(永久免杀)-PE packers protect through all the world s anti-virus software start-virus program (permanent free to kill)
Platform: | Size: 7168 | Author: De | Hits:

[Software Engineering93C86_www.ic37.com

Description: 博通 93C76芯片的相关介绍文档和使用说明文档配置说明-The Microchip Technology Inc. 93C76/86 are 8K and 16K low voltage serial Electrically Erasable PROMs. The device memory is configured as x8 or x16 bits depending on the ORG pin setup. Advanced CMOS technology makes these devices ideal for low power non-volatile memory applications. These devices also have a Program Enable (PE) pin to allow the user to write protect the entire contents of the memory array. The 93C76/86 is available in standard 8-pin DIP and 8- pin surface mount SOIC packages.
Platform: | Size: 76800 | Author: zlm | Hits:

CodeBus www.codebus.net