Protection Process
Last updated
Last updated
Protect your app with simple process
It is quite easy for developer to use Virbox Protector GUI to protect their applications with very simple process:
Step 1: Drag the application into the Virbox Protector;
Step 2: Select and Set the protection option to specified functions and set the protection to your applications in general: multiple protection options can be set;
Step 3: Click the Button "Protect Selected Project" to complete the protection process;
Step 4: Test and evaluate the security of the protected application;
Step 5: Distribute the protected application to your users or Deployed protected application in different system environment.
Virbox Protector provides multi-layer protection/encryption technology and help developer to defend third party attacker to use decompilier, debug tool static and dynamics analysis to crack your application to steal your algorithm, IP and digital asset etc.
The most important steps to protect your application is STEP 2: Function Options tabs and Protection Option tabs and STEP3: Protect the projects;
In Step 2, Developer select and set the protection option to the functions and application
In the Function Option tab, developer will select those critical functions, methods in your applications and set the protection mode to those critical functions in your application and protect it.
The protection options to "functions" includes: Virtualization, Obfuscation, Encryption and No protection which can be select and set to those functions.
In the Protection Option tabs, Developer may select and set the protection option in your application in generals, multiple protection, detection features can be set in this tab: Import Table protection, Compression, Memory Check, Resource section protection, Anti-debugging, VM detection, Memory Protection, Kernel Mode anti debugging etc. and protect data resource etc.
The protection features can be set may slight different to protect different kinds of applications, more description and details can be found in the USE CASES in following chapters.
In Step 3, after protection completed, 2 new file will be generated in the output path which you set:
The configuration file contains protection setting: samplename.exe.ssp
For the file suffix with .ssp, is the configuration file, pls keep and save it, and no need to distribute the configuration file to your software user.
and the protected file: samplename.exe which in seperately directory: \protected\samplename.exe