* compression of the application
* encryption of the application
* counteraction to dumping application memory with the tool like ProcDump.
* application integrity check
* counteraction to debuggers and disassemblers
* counteraction to memory patching
* API for interaction between application and protection routines
* creation and verification of registration keys using public keys encryption algorithms
* keeping of the database and checkup of "stolen" (illegal) registration keys
* possibility to create evaluation (trial) versions, that limit application functions based on evaluation time and the number of runs left
* expose nag-screens
* generating of registration keys, based on the specific computer system.
Partager