This group of options allows you to completely adjust the protection level for your program. Starting from the simple encryption of several bytes at the entry point to the Virtual Machine technology with full encryption. Learn more about each kind of options.
- Erase packer signature
This option makes sense only if you use any third-party EXE packer (which is not recommended if you want to rule out any error in protection) before processing the program with this protection tool. Thus, the signatures of most popular packers are erased, which does not allow crackers to unpack the program automatically.
- Encrypt original entry point
Encrypting several bytes at the entry point
- Encrypt code section
Protecting the code section against being analyzed by crackers. The code is encrypted, which does not allow crackers to use a disassembler for analysis.
- Use Virtual Machine
Its main idea is that part of the code located after the entry point (from 10 to 500 bytes depending on the set of commands) is translated into metamorphic instructions and then partially compiled into the code that only the VM interpreter can understand. This interpreter is built into your program and interprets this blocks of commands. It makes exploring your software by crackers much more complicated.
- Use anti-tracing engine
It does not allow crackers to trace your program. A lot of tracing checks (tracing means debugging the program code step by step) are built into your program, which makes exploring your program much more difficult.
- Use VB/RTTI obfuscator
This checkbox activate powerful obfuscator for Delphi/C++ Builder, Free Pascal (Lazarus) and Visual Basic 6.0 applications. This obfuscator changes all names of forms, objects, unit declarations and name of events.