Themida Help
Total Page:16
File Type:pdf, Size:1020Kb
Contents I Table of Contents Part I Themida 1 1 Why use Themida? ........................................................................................................................ 1 Scenarios for using Themida ................................................................................................................................ 1 Comparing Themida with other protectors/licensing systems ........................................................................... 2 2 User Interface ................................................................................................................................. 3 Themida GUI overview ........................................................................................................................................... 3 3 Protecting an application .............................................................................................................. 5 Application Information ......................................................................................................................................... 5 Protection Options ................................................................................................................................................. 7 Protection Macros ................................................................................................................................................ 10 Virtual Machine .................................................................................................................................................... 13 Customized Dialogs ............................................................................................................................................. 16 XBundler ............................................................................................................................................................... 19 Plugins .................................................................................................................................................................. 23 SecureEngineInitialize .................................................................................................................................... 25 SecureEngineFinalize .................................................................................................................................... 25 SecureEngineShowCustomMessage ............................................................................................................. 25 SecureEngineGetEncryptionKey .................................................................................................................... 27 Extra Options ....................................................................................................................................................... 28 Advanced Options ................................................................................................................................................ 30 Protect Now .......................................................................................................................................................... 32 Protecting through the command line ................................................................................................................ 32 4 SecureEngine® Macros .............................................................................................................. 35 Using macros in your programming language .................................................................................................. 36 VM macro .............................................................................................................................................................. 39 Mutate macro ........................................................................................................................................................ 41 StrEncrypt macro ................................................................................................................................................. 42 Unprotected macro .............................................................................................................................................. 43 CheckProtection macro ....................................................................................................................................... 44 CheckCodeIntegrity macro .................................................................................................................................. 46 CheckVirtualPC macro ......................................................................................................................................... 49 CheckDebugger macro ........................................................................................................................................ 50 Which Macros should I use? ............................................................................................................................... 52 5 FAQ ............................................................................................................................................... 52 General ................................................................................................................................................................. 53 I want to protect several applications concurrently via the command line, because I'm creating a specific protected application for each customer. Is it possible? ................................................................................. 54 I want to include relative paths in the "Input Filename" and "Output FileName" in the User Interface in Themida. How can I do that? ......................................................................................................................... 54 Is Themida compatible with Delphi 2009? ...................................................................................................... 54 Is Themida compatible with Windows 8? ....................................................................................................... 54 I'm using SetupBuilder to build and protect my application from the command line. The application is protected correctly but I don't see any log in the command line. .................................................................... 54 In my program I use the "JCLDebug" routines to get exception information (line, routine, etc) when an exception occurs. The problem is that once the application is protected, I get limited debug information. ...... 55 What's the difference between Themida and WinLicense? If I buy WinLicense, can I use it without adding license control to my software? .......................................................................................................... 55 Are there localized versions of your products to support other languages? .................................................... 55 I bought a Themida license to protect my applications. My friend needs to protect his application. Can I protect his software with Themida? ................................................................................................................ 55 © 2020 Oreans Technologies I II Themida Help I have a suggestion about a new protection feature and features for your software. Will you implement it? ................................................................................................................................................................... 55 What programming languages are supported by your products? ................................................................... 55 If I protect my app with the demo version and it is stable, do I have a good level of confidence that the purchased version will work also? .................................................................................................................. 55 What is your support policy? Do you have a minimum response and/or problem-solving time? What types of support do you offer? ........................................................................................................................ 56 How compatible is your software with various win O/S? (e.g. Vista in different languages, 2003 server, 64bit etc.) ....................................................................................................................................................... 56 I don't use Windows Vista right now, but depending on our customers I will need Themida (and also the protected application as well) to be able to run on Windows Vista. Do you also support 64-bit operating systems such as Windows 2003 x64 and Vista x64? ..................................................................................... 56 I have problems protecting my installer. What can I do? ................................................................................ 56 Protection Options ............................................................................................................................................... 57 Can I use Themida from a computer with no internet connection or better under a VirtualBox/VMWare environment? I was wondering if internet is required for Themida to work. ..................................................... 60 Do I need to ship SecureEngine.dll with my protected application? ................................................................ 60 I use Themida with Visual Studio