news

CPA

rak:
Weider
Lookfantastic
Hotels_com
shopbop
Tripbaa
Nike
Booking_com
charleskeith
AmericanEagle
TOYSELECT
Moosejaw
YOOX
Udemy線上課程
CASETiFY
NET-A-PORTER
KLOOK
愛女人購物網
High membership bonus:
High profit bonus:
Best-selling goods:
Newest brand:
ich:

Booking.com
Zapable - Instant Mobile App Agency
DFY Suite 3.0 Agency
Human Synthesys Studio Commercial
Stacy Adams
LightInTheBox Magic Cabin Hat Country LLC HearthSong
15% Off Your First Purchase! Code: WELCOME15 banggood 18% OFF
Okinawa Flat Belly Tonic (view mobile) We Are Back With Another #1 Offer! Carbofix(view mobile) Resurge - The Godzilla Of Offers (view mobile) Lean Belly 3x - The Newest Commission Crusher Has Arrived On CB (view mobile) lose weight Keravita - The Only Toenail Fungus Offer On CB

Wednesday, July 14, 2021

What is the dongle? What is its function? Is it the same as the USB flash disk

What is the dongle? What is its function? Is it the same as the USB flash disk


Working principle: a one-to-one mapping relationship is formed between the protected software and the encryption lock. The protected software continuously sends instructions to the encryption lock through its API function to determine whether the encryption lock exists in the process of running. The software cannot run without the protection lock


It's two things when it comes to USB flash disk,


The USB flash drive is from the east to the West,


There is a ROM module in the dongle, which has a fixed write decryption algorithm


Quite different


Dongle is a kind of hardware device that looks like U disk. It is named encryption lock. Later, it has developed into a popular industry term of software protection. "Dongle" is a kind of encryption product that combines software and hardware inserted into the parallel port of computer (the new dongle also has USB port). Generally, there are dozens or hundreds of bytes of nonvolatile storage space for reading and writing, and now the newer dog also contains a single chip microcomputer. Software developers can exchange data with softdog through interface function (that is, read and write softdog) to check whether the softdog is inserted in the interface; Or directly encrypt your own EXE file (commonly known as "shell") with the tool attached to the softdog. In this way, software developers can set multiple software locks in the software, and use the softdog as the key to open these locks; If the softdog is not inserted or does not correspond, the software will not run normally.


The encrypted dog exchanges data with the encrypted dog in the process of software execution to realize encryption. The embedded MCU circuit (also known as CPU) of the encrypted dog makes the encrypted dog have the processing ability of judgment and analysis, and enhances the active anti decryption ability. This kind of encryption product is called "intelligent" encryption dog. The built-in MCU of the encryption dog contains the algorithm software specially used for encryption. After the software is written into the MCU, it can no longer be read out. This ensures that the dongle hardware cannot be copied. At the same time, the encryption algorithm is unpredictable and irreversible. Encryption algorithm can transform a number or character into an integer, such as dogconvert (1) = 12345, dogconvert (a) = 43565.


Dongle is a kind of intelligent software protection tool for software developers. It includes a device installed in the parallel port or the parallel port of the computer


usb


The hardware on the interface, and a set of interface software and tool software suitable for various languages. Based on hardware protection technology, the purpose of dongle is to prevent intellectual property from being used illegally by protecting software and data.

No comments:

Post a Comment

D-Link COVR-X1873 review: Solid and reliable internet for the home

The COVR-X1873 promises to rid your home of internet black spots and from our testing, we have to agree. Keep reading to find out more. http...