news

CPA

rak:
Weider
Lookfantastic
Hotels_com
shopbop
Tripbaa
Nike
Booking_com
charleskeith
AmericanEagle
TOYSELECT
Moosejaw
YOOX
Udemy線上課程
CASETiFY
NET-A-PORTER
KLOOK
愛女人購物網
High membership bonus:
High profit bonus:
Best-selling goods:
Newest brand:
ich:

Booking.com
Zapable - Instant Mobile App Agency
DFY Suite 3.0 Agency
Human Synthesys Studio Commercial
Stacy Adams
LightInTheBox Magic Cabin Hat Country LLC HearthSong
15% Off Your First Purchase! Code: WELCOME15 banggood 18% OFF
Okinawa Flat Belly Tonic (view mobile) We Are Back With Another #1 Offer! Carbofix(view mobile) Resurge - The Godzilla Of Offers (view mobile) Lean Belly 3x - The Newest Commission Crusher Has Arrived On CB (view mobile) lose weight Keravita - The Only Toenail Fungus Offer On CB

Sunday, May 2, 2021

What is the dongle, how to use the dongle, the more specific the better

What is the dongle, how to use the dongle, the more specific the better


Now, the dongle is generally a hardware dongle.


Is a kind of similar to the U disk, is a way of anti-theft version.


Generally, a small part of the program or decryption part is integrated into the hardware of the dongle to prevent software piracy.


Dongle is a kind of software encryption product which is a combination of software and hardware inserted in the computer parallel port, and is adopted by most software developers. Generally, the encrypted dog has dozens or hundreds of bytes of nonvolatile storage space for reading and writing. Now, the newer encrypted dog also contains MCU. Software developers can check whether the dongle is inserted in the parallel port through data exchange between the interface function and the dongle (that is, read and write the dongle); Or directly use the tool attached to the dongle to encrypt your own EXE file (commonly known as "shell"). In this way, software developers can set multiple software locks in the software, and use the dongle as the key to open these locks; If the dongle is not inserted or the dongle does not correspond, the software will not run normally.


"Dongle" is a kind of encryption product which is a combination of software and hardware inserted into the parallel port of computer. Generally, there are dozens or hundreds of bytes of nonvolatile storage space for reading and writing, and now the newer dog also contains a single chip microcomputer. Software developers can exchange data with softdog through interface function (that is, read and write softdog) to check whether softdog is inserted in parallel port; Or directly use the tool attached to the softdog to encrypt your own EXE file (commonly known as "shell"). In this way, software developers can set multiple software locks in the software, and use the softdog as the key to open these locks; If the softdog is not inserted or does not correspond, the software will not run normally.


The encrypted dog exchanges data with the encrypted dog in the process of software execution to realize encryption. The embedded MCU circuit (also known as CPU) of the encrypted dog makes the encrypted dog have the processing ability of judgment and analysis, and enhances the active anti decryption ability. This kind of encryption product is called "intelligent" encryption dog. The built-in MCU of the encryption dog contains the algorithm software specially used for encryption. After the software is written into the MCU, it can no longer be read out. This ensures that the dongle hardware cannot be copied. At the same time, the encryption algorithm is unpredictable and irreversible. Encryption algorithm can transform a number or character into an integer, such as dogconvert (1) = 17345, dogconvert (a) = 43565. Next, we give an example to illustrate the use of MCU algorithm. For example, there is such a sentence in a program: a = FX (3). The program should get the value of variable a according to constant 3. So we can rewrite the original program like this: a = FX (dogconvert (1) - 12342). Then the constant 3 will not appear in the original program, and dogconvert (1) - 12342 will be used instead. In this way, only the software writer knows that the constant actually called is 3. If there is no dongle, the dogconvert function will not return the correct result, and the result formula a = FX (dogconvert (1) - 12342) will not be correct. This kind of encryption method, which makes the pirated users not get the value of the software, is more gentle, more hidden and more difficult for the decryptors to ponder than the encryption method of warning and stopping when they find the illegal use. In addition, the dog has read-write function, which can be used to read and write the internal memory of the dog. So we can also write 12342 in the above formula to the dog's memory, so that the value of a completely depends on the results of dogconvert() and dogread() functions, which makes decryption more difficult. However, generally speaking, the algorithm difficulty of dongle MCU is lower than some public encryption algorithms, such as DES, because decryptors have to face many difficulties before touching the algorithm of dongle

No comments:

Post a Comment

Mum divides the internet with her 'lazy' way of keeping her stovetop clean for a week - so whose ...

So I don't have to clean every day,' Patricia posted on Facebook. A mum has divided the internet after sharing her unusual way of ke...