Protection Process
Last updated
Was this helpful?
Last updated
Was this helpful?
Virbox Protector provides multi-layer protection/encryption technology and help developer to defend third party attacker to use decompilier, debug tool static and dynamics analysis to crack your application to steal your algorithm, IP and digital asset etc.
The most important steps to protect your application is STEP 2: Function Options tabs and Protection Option tabs and STEP3: Protect the projects;
In Step 2, Developer select and set the protection option to the functions and application
In the Function Option tab, developer will select those critical functions, methods in your applications and set the protection mode to those critical functions in your application and protect it.
The protection options to "functions" includes: Virtualization, Obfuscation, Encryption and No protection which can be select and set to those functions.
In the Protection Option tabs, Developer may select and set the protection option in your application in generals, multiple protection, detection features can be set in this tab: Import Table protection, Compression, Memory Check, Resource section protection, Anti-debugging, VM detection, Memory Protection, Kernel Mode anti debugging etc. and protect data resource etc.
The protection features can be set may slight different to protect different kinds of applications, more description and details can be found in the USE CASES in following chapters.
In Step 3, after protection completed, 2 new file will be generated in the output path which you set:
The configuration file contains protection setting: samplename.exe.ssp
and the protected file: samplename.exe which in seperately directory: \protected\samplename.exe