news

CPA

Booking.com
Zapable - Instant Mobile App Agency
DFY Suite 3.0 Agency
Human Synthesys Studio Commercial
Stacy Adams
LightInTheBox Magic Cabin Hat Country LLC HearthSong
15% Off Your First Purchase! Code: WELCOME15 banggood 18% OFF
Okinawa Flat Belly Tonic (view mobile) We Are Back With Another #1 Offer! Carbofix(view mobile) Resurge - The Godzilla Of Offers (view mobile) Lean Belly 3x - The Newest Commission Crusher Has Arrived On CB (view mobile) lose weight Keravita - The Only Toenail Fungus Offer On CB

Sunday, March 28, 2021

What is a dongle and how to use it?

What is a dongle and how to use it?


Now, the dongle is generally a hardware dongle. Is a kind of similar to the U disk, is a way of anti-theft version. Generally, a small part of the program or decryption part is integrated into the hardware of the dongle to prevent software piracy. Dongle is a kind of software encryption product which is a combination of software and hardware inserted in the computer parallel port, and is adopted by most software developers. Generally, the encrypted dog has dozens or hundreds of bytes of nonvolatile storage space for reading and writing. Now, the newer encrypted dog also contains MCU. Software developers can check whether the dongle is inserted into the parallel port through data exchange between the interface function and the dongle (that is, read and write the dongle), or directly encrypt their own EXE file (commonly known as "shell") with the tool attached to the dongle. In this way, software developers can set multiple software locks in the software, and use the dongle as the key to open these locks; if the dongle is not inserted or the dongle does not correspond, the software will not run normally. "Dongle" is a kind of encryption product which is a combination of software and hardware inserted into the parallel port of computer. Generally, there are dozens or hundreds of bytes of nonvolatile storage space for reading and writing, and now the newer dog also contains a single chip microcomputer. Software developers can exchange data with softdog through interface function (i.e. read and write softdog) to check whether softdog is inserted in parallel port, or directly encrypt their own EXE file (commonly known as "shell") with tools attached to softdog. In this way, software developers can set multiple software locks in the software, and use the softdog as the key to open these locks; if the softdog is not inserted or does not correspond, the software will not run normally. The encrypted dog exchanges data with the encrypted dog in the process of software execution to realize encryption. The embedded MCU circuit (also known as CPU) of the encrypted dog makes the encrypted dog have the processing ability of judgment and analysis, and enhances the active anti decryption ability. This kind of encryption product is called "intelligent" encryption dog. The built-in MCU of the encryption dog contains the algorithm software specially used for encryption. After the software is written into the MCU, it can no longer be read out. This ensures that the dongle hardware cannot be copied. At the same time, the encryption algorithm is unpredictable and irreversible. Encryption algorithm can transform a number or character into an integer, such as dogconvert (1) = 17345, dogconvert (a) = 43565. Next, we give an example to illustrate the use of MCU algorithm. For example, there is such a sentence in a program: a = FX (3). The program should get the value of variable a according to constant 3. So we can rewrite the original program (dogconvert = 123f42). Then the constant 3 will not appear in the original program, and dogconvert (1) - 12342 will be used instead. In this way, only the software writer knows that the constant actually called is 3. If there is no dongle, the dogconvert function will not return the correct result, and the result formula a = FX (dogconvert (1) - 12342) will not be correct. This kind of encryption method, which makes the pirated users not get the value of the software, is more gentle, more hidden and more difficult for the decryptors to ponder than the encryption method of warning and stopping when they find the illegal use. In addition, the dog has read-write function, which can be used to read and write the internal memory of the dog. So we can also write 12342 in the above formula to the dog's memory, so that the value of a completely depends on the results of dogconvert() and dogread() functions, which makes decryption more difficult. However, generally speaking, the algorithm difficulty of dongle MCU is lower than some public encryption algorithms, such as DES, because decryptors have to face many difficulties before touching the algorithm of dongle

No comments:

Post a Comment

Reliance's cost of funding declines 42 bps in a year

Between April and May last year, RIL mopped up about Rs 25,000 crore via local bonds. MUMBAI: Funding costs for Reliance Industries (RIL), I...