Protecting Windows Apps

This section describes how to protect Windows applications. ElecKey provides a full set of tools that allow you to protect a variety of applications, which include desktop apps (Win16, Win32, Win64, .NET assembly), web apps (ASP.NET, JavaScript), as well as legacy MS-DOS programs (COM, EXE). You can choose from the following methods to protect your application.

Sell Protection

The shell protection offers a fast and easy way to protect your application. It basically provides a wrapper that allows you to integrate the software protection and licensing system into your application instantly, with no need of the source code or having to modify any code.

KeyCheck API

The KeyCheck API provides the functions, class libraries, components that allow you to integrate the software protection and licensing system into your application. It offers greater flexibility and better seamless integration than the shell protection method. You can develop your application with a customized protection and licensing system in any way you want. It also allows you to protect more types of applications such as MS Access/Excel/Word Macro, Visual FoxPro, .NET WPF, and more.

Instant KeyCheck API

The Instant KeyCheck API is a special set of function, class library, and component that is designed to provide a simpler and easier way to interface the API with your application. It provides a hybrid approach that allows you to use ElecKey Integrator to specify the settings and options as the System Image file. Then, you only need to add a few lines of code to integrate the software protection and licensing system into your application.

 

noteNOTE: If you have tried the shell protection method, but it appears to be failed or not functioning properly. It is possible that there is some limitation that prevents the shell protection from wrapping the executable. In this case, it is recommended to use the KeyCheck API instead. You can also choose the Instant KeyCheck API that you will be able to protect your application quickly, similar to the way of using the shell protection.

See Also

         Deployment