protection process

Develop

Application development process.

Build

Build release version of application from source code.

Protect

Protect application with PC Guard. This step can be automated with command line interface.

Package

Digitally sign protected application and package it into distribution setup (.exe, .msi or .zip)

Distribute

Distribute packaged application to end users by any means (Internet, CD, DVD, USB drive...)

Activate

Activate and lock protected application with activation code.

Standard protection

Standard protection is always applied to application during protection process regardless of selected protection method and it includes:

wrapping

(application is wrapped into security envelope)

encryption

(application is encrypted)

anti-debugging

(special anti-debugging code is embedded into protected application)

anti-decompilation

(application can not be decompiled)

Protection methods

There are four basic protection methods: PLAIN, REMOTE, NETWORK and USB and here is how they are related to standard protection:

PLAIN

Standard protection

REMOTE

Standard protection + Machine locking + Activation

NETWORK

Standard protection + Network licensing

USB

Standard protection + USB locking

Protect any application

PC Guard protection is applied directly to compiled applications and modules by wrapping them into security envelope. This means that almost any kind of native (unmanged) Windows, .NET framework, Windows .NET Core, standard and non-standard applications application can be protected regardless of programming language used.

Compatibility

Protected applications will work on all 32-bit and 64-bit desktop and server Windows operating systems from Windows NT to latest editions of Windows 10. Protected application can be run from any storage device like hard drive, usb drive or directly from read-only storage like cd or dvd.

Out-of-the-box solution

By default, no additional programming and source code editing is required. PC Guard can by used by anyone, from absolute beginners to professional software developers. Protection process is simple and effective. Set project settings accordingly to your requirements and click on Protect! button to encrypt application. That's it!

Application is encrypted during protection process and our protection code is embedded into it. Security envelope consist of large number of encryption layers and anti-debugging, anti-reverse engineering code and contains all protection functions.

Protection code will gain control on startup, check license status, demo limitations, application integrity, initialize required data, decrypt protected application and pass control to it without dumping decrypted code to hard drive at any time.

Machine locking

Machine locking is the process of locking (linking) protected application to remote computer in order to prevent illegal usage on multiple computers. There are seven different locking parameters (locks) which can be set as mandatory if required. By default, change in any of selected locking parameters will result in license reset. Application will erase current license, change site/mid codes and request new activation code. Use flexible licensing feature to customize default locking policy.

Activation

Effective machine locking requires software activation process. Software activation represents exchange of keys (activation codes) between you and your end users.

activation process (manual)

End user would submit his site/mid codes (unique computer id) to you and you would provide appropriate valid activation code based on these codes back to end user. User then can activate his application on remote computer with provided activation code. The whole process of activation can be done manually by email or phone as presented above or fully automated with the help of Activation center:

activation process (automatic)