{"id":1967,"date":"2019-01-14T04:15:10","date_gmt":"2019-01-14T04:15:10","guid":{"rendered":"http:\/\/por.tw\/Rich\/?p=1967"},"modified":"2019-01-14T04:15:10","modified_gmt":"2019-01-14T04:15:10","slug":"%e4%bf%9d%e8%ad%b7%e5%8f%af%e5%9f%b7%e8%a1%8c%e6%aa%94%e6%a1%88%e9%9d%9e%e6%b3%95%e8%a4%87%e8%a3%bd-%e9%bb%91%e5%ae%a2%e5%85%a5%e4%be%b5-%e4%bf%ae%e6%94%b9%e5%92%8c%e5%88%86%e6%9e%90-the-enigma-prote","status":"publish","type":"post","link":"https:\/\/por.tw\/Rich\/%e4%bf%9d%e8%ad%b7%e5%8f%af%e5%9f%b7%e8%a1%8c%e6%aa%94%e6%a1%88%e9%9d%9e%e6%b3%95%e8%a4%87%e8%a3%bd-%e9%bb%91%e5%ae%a2%e5%85%a5%e4%be%b5-%e4%bf%ae%e6%94%b9%e5%92%8c%e5%88%86%e6%9e%90-the-enigma-prote\/","title":{"rendered":"\u4fdd\u8b77\u53ef\u57f7\u884c\u6a94\u6848\u975e\u6cd5\u8907\u88fd.\u9ed1\u5ba2\u5165\u4fb5.\u4fee\u6539\u548c\u5206\u6790 The Enigma Protector 3.1"},"content":{"rendered":"<p><strong>\u4fdd\u8b77\u53ef\u57f7\u884c\u6a94\u6848\u975e\u6cd5\u8907\u88fd.\u9ed1\u5ba2\u5165\u4fb5.\u4fee\u6539\u548c\u5206\u6790 The Enigma Protector 3.1<\/strong><\/p>\n<p><strong>The Enigma Protecto \u542b\u7bc4\u570d\u5ee3\u6cdb\u7684\u7368\u7279\u529f\u80fd\uff0c\u65e8\u5728\u4fdd\u8b77\u7684\u53ef\u57f7\u884c\u6a94\u6848\u975e\u6cd5\u8907\u88fd\uff0c\u9ed1\u5ba2\u5165\u4fb5\uff0c\u4fee\u6539\u548c\u5206\u6790\u3002<\/strong><br \/>\n<strong>\u652f\u63f4\u7684\u683c\u5f0f\u5167\u542b\u5e7e\u4e4e\u6240\u6709\u985e\u578b\u768432 &#8211; \u548c64\u4f4d\u7684\u53ef\u57f7\u884c\u6a94\u6848\uff08exe\u6a94\u6848\uff0cSRC\u7684DLL\uff0cOCX\uff0cBPL\uff0c\u7b49\uff09\u548c\u3002<\/strong><br \/>\n<strong>NET\u6a94\u6848\u4e2d\u4f7f\u7528\u4e0d\u540c\u7684\u958b\u767c\u5de5\u5177\uff0c\u5982MS\u7684Visual Studio\u7684\u00c7\uff03\/\u00c7+ + \/ VB\u5efa\u7acb\/ VB.NET\uff0cBorland\u7684Delphi \/ C + +\uff0cFreePascal\u7684\uff0cMASM\uff0cTASM\u548c\u5176\u4ed6\u4eba\u3002<\/strong><br \/>\n<strong>\u53ef\u4ee5\u904b\u884c\u5728\u6240\u6709\u7248\u672c\u7684Windows 95\/98\/ME\/2000\/XP\/2003\/Vista\/2008\u548cWindows 7\u7684\u53d7\u4fdd\u8b77\u7684\u6a94\u6848\u3002<\/strong><\/p>\n<p><strong>The Enigma Protecto \u4fdd\u8b77\u60a8\u7684\u8edf\u9ad4\uff0c\u8010\u958b\u88c2\uff0c\u5f9e\u800c\u6703\u589e\u52a0\u4f60\u7684\u92b7\u552e\u3002<\/strong><br \/>\n<strong>\u8a3b\u518a\u5bc6\u9470\u751f\u6210\u6297\u653b\u64cacryptoalgorithms\u7684\u4f7f\u7528\u53ef\u80fd\u6703\u7121\u6cd5\u91cd\u5efa\u6216\u8907\u88fd\u7684\u8a3b\u518a\u5bc6\u9470\u751f\u6210\u5668\u8edf\u9ad4\u3002<\/strong><br \/>\n<strong>\u5404\u7a2e\u65b9\u6cd5\u7684\u4ee3\u78bc\u6df7\u6dc6\uff0c\u57fa\u56e0\u7a81\u8b8a\u548c\u865b\u64ec\u5316\u5c07\u6709\u52a9\u65bc\u4fdd\u8b77\u60a8\u7684\u61c9\u7528\u7a0b\u5f0f\u53d7\u5230\u653b\u64ca\uff0c\u4fee\u6539\uff0c\u62c6\u89e3\uff0c\u975e\u6cd5\u6aa2\u7d22\u7684\u7368\u7279\u7684\u529f\u80fd\u548c\u8cc7\u6599\u7b49\u3002<\/strong><\/p>\n<p><a href=\"https:\/\/visdacom.com\/Rich\/wp-content\/uploads\/2012\/10\/ok75.jpg\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1969\" title=\" \u4fdd\u8b77\u53ef\u57f7\u884c\u6a94\u6848\u975e\u6cd5\u8907\u88fd.\u9ed1\u5ba2\u5165\u4fb5.\u4fee\u6539\u548c\u5206\u6790 The Enigma Protector 3.1\" src=\"https:\/\/visdacom.com\/Rich\/wp-content\/uploads\/2012\/10\/ok75.jpg\" alt=\" \u4fdd\u8b77\u53ef\u57f7\u884c\u6a94\u6848\u975e\u6cd5\u8907\u88fd.\u9ed1\u5ba2\u5165\u4fb5.\u4fee\u6539\u548c\u5206\u6790 The Enigma Protector 3.1\" width=\"228\" height=\"280\" srcset=\"https:\/\/por.tw\/Rich\/wp-content\/uploads\/2012\/10\/ok75.jpg 228w, https:\/\/por.tw\/Rich\/wp-content\/uploads\/2012\/10\/ok75-163x200.jpg 163w, https:\/\/por.tw\/Rich\/wp-content\/uploads\/2012\/10\/ok75-147x180.jpg 147w\" sizes=\"(max-width: 228px) 100vw, 228px\" \/><\/a><\/p>\n<p><span style=\"color: #ff0000;\"><strong>\u4fdd\u8b77\u53ef\u57f7\u884c\u6a94\u6848\u975e\u6cd5\u8907\u88fd.\u9ed1\u5ba2\u5165\u4fb5.\u4fee\u6539\u548c\u5206\u6790 The Enigma Protector 3.1\u529f\u80fd\uff1a<\/strong><\/span><br \/>\n<strong>\u300c\u6a94\u6848\u4fdd\u8b77\u300d<\/strong><br \/>\n<strong>\u4e00\u7cfb\u5217\u7684\u529f\u80fd\u548c\u6280\u8853\uff0c\u4ee5\u8aaa\u660e\u4fdd\u8b77\u7684\u53ef\u57f7\u884c\u6a94\u6848\uff0c\u9ed1\u5ba2\uff0c\u5206\u6790\uff0c\u4fee\u6539\u548c\u62c6\u5378\u3002<\/strong><br \/>\n<strong>\u865b\u64ec\u6a5f\u6280\u8853\u7684\u61c9\u7528\u548c\u4fdd\u8b77\u8981\u57f7\u884c\u7684\u4ee3\u78bc\u5728\u81ea\u5df1\u7684\u865b\u64ecCPU\uff0c\u9019\u4f7f\u5f97\u4ee3\u78bc\u5e7e\u4e4e\u662f\u4e0d\u53ef\u80fd\u7684\u5206\u6790\u3002<\/strong><\/p>\n<p><strong>The Enigma Protector includes a wide range of unique features aimed at protecting executable files from illegal copying, hacking, modification, and analysis. The supported formats include almost all types of 32- and 64-bit executable files (exe, src, dll, ocx, bpl, etc.) and .NET files created using various development tools, such as MS Visual Studio C#\/C++\/VB\/VB.NET, Borland Delphi\/C++, FreePascal, MASM, TASM and others. The protected files can be run on all versions of Windows 95\/98\/ME\/2000\/XP\/2003\/Vista\/2008 and Windows 7.<\/strong><\/p>\n<p><strong>The Enigma Protector will make your software resistant to cracking, and thus will increase your sales. The use of attack-proof cryptoalgorithms for registration key generation will make it impossible for others to reconstruct or reproduce the registration key generator for your software. Various methods of code obfuscation, mutation and virtualization will help protect your application from hacking, modifying, disassembling, illegal retrieval of unique functions and data, etc.<\/strong><\/p>\n<p><strong>Enigma Protector Features:<\/strong><br \/>\n<strong>File Protection<\/strong><br \/>\n<strong>A range of features and technologies to help protect the executable file from hacking, analysis, modification and disassembly. A Virtual Machine technology enables part of the application and protection code to be executed in its own virtual CPU, which makes the code practically impossible to analyze.<\/strong><\/p>\n<p><strong>Licensing System<\/strong><br \/>\n<strong>The licensing system allows prompt integration of registration key verification functions, binding license to a specific computer, limiting the term of license. Rich functionality of the licensing system allows you to create your own key generators and to use the built-in or easily customizable CGI key generators.<\/strong><\/p>\n<p><strong>Virtual Box<\/strong><br \/>\n<strong>The unique technology which allows combining the files used by your application into a single module without loss of efficiency. This function supports all kinds of files, including dll, ocx, mp3, avi, etc. Virtual Box will protect your files and prevent them from being copied and used in third-party products.<\/strong><\/p>\n<p><strong>\u041e\u0421 | OS: Windows 2000\/XP\/Vista\/7<\/strong><\/p>\n<p><strong><span style=\"color: #ff00ff;\">\u4fdd\u8b77\u53ef\u57f7\u884c\u6a94\u6848\u975e\u6cd5\u8907\u88fd.\u9ed1\u5ba2\u5165\u4fb5.\u4fee\u6539\u548c\u5206\u6790 The Enigma Protector 3.1 <\/span>| Home Page: http:\/\/www.enigmaprotector.com\/<\/strong><\/p>\n<p><strong><span style=\"color: #0000ff;\">\u4fdd\u8b77\u53ef\u57f7\u884c\u6a94\u6848\u975e\u6cd5\u8907\u88fd.\u9ed1\u5ba2\u5165\u4fb5.\u4fee\u6539\u548c\u5206\u6790 The Enigma Protector 3.1<\/span> | Size: 21 Mb<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u4fdd\u8b77\u53ef\u57f7\u884c\u6a94\u6848\u975e\u6cd5\u8907\u88fd.\u9ed1\u5ba2\u5165\u4fb5.\u4fee\u6539\u548c\u5206\u6790 The Enigma Protector 3.1 The Eni [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1969,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[22],"class_list":["post-1967","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-11","tag-22"],"_links":{"self":[{"href":"https:\/\/por.tw\/Rich\/wp-json\/wp\/v2\/posts\/1967"}],"collection":[{"href":"https:\/\/por.tw\/Rich\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/por.tw\/Rich\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/por.tw\/Rich\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/por.tw\/Rich\/wp-json\/wp\/v2\/comments?post=1967"}],"version-history":[{"count":0,"href":"https:\/\/por.tw\/Rich\/wp-json\/wp\/v2\/posts\/1967\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/por.tw\/Rich\/wp-json\/wp\/v2\/media\/1969"}],"wp:attachment":[{"href":"https:\/\/por.tw\/Rich\/wp-json\/wp\/v2\/media?parent=1967"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/por.tw\/Rich\/wp-json\/wp\/v2\/categories?post=1967"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/por.tw\/Rich\/wp-json\/wp\/v2\/tags?post=1967"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}