home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
CD-ROM Aktief 1995 #3
/
CDA3.iso
/
compress
/
prexcm40.zip
/
PROTEXCM.DOC
< prev
next >
Wrap
Text File
|
1993-10-29
|
15KB
|
352 lines
Protect! EXE/COM v.4.0+
(C) 1993 Jeremy Lilley,
All Rights Reserved
October 30, 1993
The Very Brief Table of Contents:
Introduction: What's New With Protect! EXE/COM v.4.0+ ? ... 1
Why Should I Choose Protect ? ............................. 1
Requirements .............................................. 2
How To Use Protect! EXE/COM ............................... 2
Which Files Can't Be Protected ............................ 3
Legal Terms / Disclaimer .................................. 3
License ................................................... 4
How Does Protect! EXE/COM Stand up to Other Utilities? .... 4
Technical Notes ........................................... 5
Closing (Beg Stuff) ....................................... 6
Introduction: What's New With Protect! EXE/COM v.4.0+ ?
Well, Protect! EXE/COM v.4.0+ is back again with a powerful
polymorphic mutation engine that will mutate the security
envelopes. This effectively gives you a new version of Protect! for
every file that you protect, hindering cracking, reverse
engineering, and modification of your programs. Entirely rewritten
in assembly language, Protect! runs much faster, tighter, and more
stable. Overlay support is now included for the most part and your
files will probably load up to 4 times (See technical notes) faster
than with previous versions of Protect. Also, registered users can
simply create a file named CRC.MSG to store their default CRC error
message file so that they can customize their CRC error messages
much more easily.
Why Should I Choose Protect ?
Compared to other utilities, Protect! is one of the few to
check the integrity of the file every time it is run, and it will
stop with an error message of your choice if there is a
discrepancy. Optimized for speed, Protect! is clearly the product
of choice as it never sacrifices the security of your programs.
Software developers and programmers (especially for shareware) can
protect their programs from being ALTERED when their software is
released, and all of the this protection can be implemented without
the final user having to know about it. Do your own investigation
and checking with Protect! and see for yourself that Protect!
really is a secure and powerful utility.
Page 1
Also, Protect! is much less expensive ($25) than any other
option or utility that could possibly be comparable (unless you
made a well-working custom option, which can be costly and time-
consuming). Regarding the use of Protect, unregistered users are
not legally allowed to distribute files that they Protect, as this
is an evaluation version. Hacking is becoming more and more common,
and the $25 registration fee is a small price to pay to help
prevent your program from being altered or hacked in the field.
Requirements:
The requirements are basically nil: DOS 2.0, IBM PC, 64k,
etc... I can run this program on my 4.77 mhz XT and have it run
quickly. The one major software requirement for protecting EXE
files is that you are REQUIRED TO USE AN EXE COMPRESSION PROGRAM
such as LZEXE (FREE!), PKLITE, Compack, or Diet. The reasons are
simple -- scrambled data seems more scrambled if it is compressed
first (basically because it looks more like gibberish). Of course,
the files also takes up less space when compressed with an
executable compressor, and it will give a hacker more problems than
those that Protect! EXE/COM gives alone. Protect! EXE/COM also can
insure that the programs that it protects will run consistently if
they originate in the more consistent form that LZEXE or PKLite
provides them in. So generally as an extra caution, the use of an
EXE compressor is required.
How To Use Protect! EXE/COM:
Since the interactive mode was taken out of Protect! v.4.0+,
the only syntax for Protect! EXE/COM is the following:
ProtExCm filename[.EXT]
Here are some usage examples:
ProtExCm MyProg.EXE
(To Protect MyProg.EXE)
ProtExCm MyProg
(To Protect either MyProg.EXE or MyProg.COM)
Since unregistered users (you) can't customize their own CRC error
messages, you get the CRC error message that I specify (which tells
whoever sees the message that you haven't registered Protect!) While
this isn't crippling as it allows you to completely evaluate Protect!,
I provides an incentive to register.
In addition, an errorlevel of 250 is returned to DOS when a CRC
error occurs.
Page 2
Please note that no file can be expanded after being protected
with Protect! EXE/COM, so please preserve the backup file (.OLD)
until you are sure that the protected file runs correctly (some
incompatibilities may arise with certain files). This is about all
that you need to know before you can really start protecting your
programs with Protect! EXE/COM. EXE files must be compressed with
LZEXE, PKLite, or some other executable compression utility such
as TinyProg or Compack and before being protected but COM files can
be directly protected. A file called Protect.BAT is included, and
using it can be a little bit easier than doing the steps
separately:
Protect MyProg EXE
However, you may want to make your own batch files for a
specific project or specific files, as Protect.BAT can be an
inconvenience to use in some cases.
Which Files Can't Be Protected:
Windows and OS/2 files cannot be protected with Protect
EXE/COM. The reason for this is that a Windows EXE is basically a
small DOS program that says "this program requires Windows" with
a pointer to the actual Windows program (which only Windows and
Windows-supporting products detect in order to use the Windows
part). So if you tried to Protect a Windows file, you would have
a monster-sized program that tells you that you need Windows to run
it (but Windows would not recognize it as a Windows EXE). In short,
don't bother trying to Protect Windows files. Don't protect files
such as IBMBIO.COM and IBMDOS.COM, found on machines with IBM's
version of DOS. COMMAND.COM can be Protected (I wouldn't really do
this though), but you might set off a resident virus detector alert
in the process.
Legal Terms / Disclaimer:
Protect! EXE/COM v.4.0+ ("program") will alter executable
files and may have or cause compatibility problems with them (that
is why .OLD files are created, in case of incompatibility with a
particular file) in certain circumstances. Under no circumstances
may Jeremy Lilley ("author") be held liable or accountable for any
damage to system files, executable files, data files, or any other
system damage due to use or misuse of this program. The author also
may not be held accountable for loss of profits or for any other
damages incurred by the use or misuse of this program. The author
has forewarned any users that damage to files may occur with misuse
of his program and in executing the program, the user understands
this risk. There is not guarantee that this product will not be
Page 3
broken into, however the author has made it extremely difficult to
do so.
Don't worry -- there is little risk of damage resulting from
this program's use as long as you use it correctly. However, if you
try to make it mess up, it probably will. Just remember that it
isn't my fault if you misuse my program.
License:
You may use Protect! EXE/COM for the purposes of evaluating
it (after understanding the disclaimer and the documentation) for
30 days. No files protected by Protect! EXE/COM during this trial
period may be distributed to other computers at all, commercially
or non-commercially. If you find Protect! EXE/COM to be of use to
you, you must register Protect! EXE/COM with the author.
Government, educational, and commercial institutions must register
this program with the author prior to use (please contact him for
quantity discounts). Sysops, user