news

CPA

hc:
Aliexpress WW Vevor Many GEOs Лабиринт OnePlus [CPS] Many Geos Fernsnpetals [CPS] IN Komily WW IGP [CPS] WW
lc:
Fairyseason WW DHgate WW Banggood WW Economybookings Many GEO's Lenovo Many GEOs Mego.travel Norton [CPS] WW ChicMe WW
ua:
EvroGroshi [CPS, API] UA Kreditmarket [CPS, API] UA Slon Credit [CPS,API] UA Microcash [CPS] UA
FanDuel Fantasy Sports Register + Join a Group
Booking.com

Sunday, March 28, 2021

What is a dongle and how to use it?

What is a dongle and how to use it?


Now, the dongle is generally a hardware dongle. Is a kind of similar to the U disk, is a way of anti-theft version. Generally, a small part of the program or decryption part is integrated into the hardware of the dongle to prevent software piracy. Dongle is a kind of software encryption product which is a combination of software and hardware inserted in the computer parallel port, and is adopted by most software developers. Generally, the encrypted dog has dozens or hundreds of bytes of nonvolatile storage space for reading and writing. Now, the newer encrypted dog also contains MCU. Software developers can check whether the dongle is inserted into the parallel port through data exchange between the interface function and the dongle (that is, read and write the dongle), or directly encrypt their own EXE file (commonly known as "shell") with the tool attached to the dongle. In this way, software developers can set multiple software locks in the software, and use the dongle as the key to open these locks; if the dongle is not inserted or the dongle does not correspond, the software will not run normally. "Dongle" is a kind of encryption product which is a combination of software and hardware inserted into the parallel port of computer. Generally, there are dozens or hundreds of bytes of nonvolatile storage space for reading and writing, and now the newer dog also contains a single chip microcomputer. Software developers can exchange data with softdog through interface function (i.e. read and write softdog) to check whether softdog is inserted in parallel port, or directly encrypt their own EXE file (commonly known as "shell") with tools attached to softdog. In this way, software developers can set multiple software locks in the software, and use the softdog as the key to open these locks; if the softdog is not inserted or does not correspond, the software will not run normally. The encrypted dog exchanges data with the encrypted dog in the process of software execution to realize encryption. The embedded MCU circuit (also known as CPU) of the encrypted dog makes the encrypted dog have the processing ability of judgment and analysis, and enhances the active anti decryption ability. This kind of encryption product is called "intelligent" encryption dog. The built-in MCU of the encryption dog contains the algorithm software specially used for encryption. After the software is written into the MCU, it can no longer be read out. This ensures that the dongle hardware cannot be copied. At the same time, the encryption algorithm is unpredictable and irreversible. Encryption algorithm can transform a number or character into an integer, such as dogconvert (1) = 17345, dogconvert (a) = 43565. Next, we give an example to illustrate the use of MCU algorithm. For example, there is such a sentence in a program: a = FX (3). The program should get the value of variable a according to constant 3. So we can rewrite the original program (dogconvert = 123f42). Then the constant 3 will not appear in the original program, and dogconvert (1) - 12342 will be used instead. In this way, only the software writer knows that the constant actually called is 3. If there is no dongle, the dogconvert function will not return the correct result, and the result formula a = FX (dogconvert (1) - 12342) will not be correct. This kind of encryption method, which makes the pirated users not get the value of the software, is more gentle, more hidden and more difficult for the decryptors to ponder than the encryption method of warning and stopping when they find the illegal use. In addition, the dog has read-write function, which can be used to read and write the internal memory of the dog. So we can also write 12342 in the above formula to the dog's memory, so that the value of a completely depends on the results of dogconvert() and dogread() functions, which makes decryption more difficult. However, generally speaking, the algorithm difficulty of dongle MCU is lower than some public encryption algorithms, such as DES, because decryptors have to face many difficulties before touching the algorithm of dongle

No comments:

Post a Comment

Myanmar junta blames internet blackouts on anti-coup fighters - The Hindu

Post-coup Myanmar is no stranger to internet blackouts, with the junta imposing one in the early hours of February 1 as soldiers arrested Ms...