PC Guard protection is applied directly to compiled applications such as .EXE, .DLL and .OCX files by wrapping them into security envelope. This means that almost any kind of application can be protected regardless of programming language used.

By default, no additional programming and source code editing is required. Protection process is simple and effective: set project settings accordingly to your requirements and click on Protect! button to encrypt application.

Application is encrypted during protection process and our protection code is embedded into it. Security envelope consist of large number of encryption layers and anti-debugging, anti-reverse engineering code and contains all protection functions.

Protection code will gain control on startup, check license status, demo limitations, application integrity, initialize required data, decrypt protected application and pass control to it. Protected application is not dumped to disk at any time.

Protection process with PC Guard software protection system usually includes the following steps:

Step1 Compilation
Release version of application is compiled from source code. (this step may not be required if you already have compiled binary applications)
Step2 Protection
Compiled application is protected with appropriate project settings. This step can be automated by using command line interface.
Step3 Packaging
Protected application is prepared for distribution, usually packaged into distributions setup (.exe, .msi or .zip)
Step4 Distribution
Packaged application is distributed to end users. Application can be distributed to end users by any means (Internet, CD, DVD...). If application is distributed via third party serial numbers feature can be used for marking each copy with appropriate serial number. Serials numbers will allow tracking and identification of each distributed copy.
The following additional steps are present only in case activation is required (remote protection method).
Step5 Request for activation
End user will install and run protected application. Application will display unique site/mid codes for his machine and prompt for activation code. End user can now pass these codes to you via email, phone, fax...
Step6 Generation of activation codes
Valid activation code (based on used project and provided site/mid codes) is generated in PC Guard's activation panel and then passed back to end user. This process can be automated with the help of Activation suite (ACCS) and Activation center (ACEN).
Step7 Activation
End user will activate application with provided activation code.