IcebergLock Protector
 

IcebergLock Protector 3.10.1.36

IcebergLock Protector : Protect application modules with deep integration with the protection system



IcebergLock Protector is a software protection system, which allows your application modules to be protected with deep integration with the protection system.IcebergLock Protector uses powerful encryption algorithms to hide critical parts of code, which will be decrypted only for execution time.IcebergLock Protector allows software developers to implement their own registration keys generation algorithms. Only you, and nobody else, will know how to get registration information and decryption keys from a registration key.With IcebergLock Protector you can restrict your modules functionality in trial or demo mode. You can implement full and demo functions pairs and the protector will automatically choose an appropriate function version to be executed depending on registration information.Full version functions are accessible only if a valid registration key is present (decryption keys for these functions are encoded in the registration key).IcebergLock Protector contains embedded Internet License Manager (ILM) which allows manage licenses you grant to users. All data can be stored in a remote database in your web site.Database interchange is implemented using PHP scripts, but you can use in your real projects Perl, CGI or any other scripts. This feature allows you to organize your product on-line registration.Here are some key features of "IcebergLock Protector":· IcebergLock Protector can protect a batch of your project modules (applications and libraries) in a single process, using common project's protection parameters.· IcebergLock Protector encrypts and compresses code, import and relocations sections in every module.· IcebergLock Protector allows developers define hidden functions and blocks of code, full and demo versions of functions, which will be encrypted by the protector and decrypted for execution-time only. Full version functions can be decrypted only if a valid registration key is present.· IcebergLock Protector provides counteraction against debuggers and disassemblers; modules integrity checking; API for interaction between a module and the protection system; hardware-dependent or predefined serial number schemes;· Black List for stolen or illegal serial numbers and email addresses.· Delphi, C++ Builder and Visual C++ examples included.Limitations:· 30 days trial· Demonstration time of working is limited down to 60 minutes since first program run in current Windows session. After the demonstration time expires, you must reboot Windows to continue working with IcebergLock Protector;· You can protect only single hidden function, single plain block of code and single pair of full and demo functions in every module;· You can not import/export your protection projects data into/from databases.

Conclusion

To conclude IcebergLock Protector works on Windows operating system(s) and can be easily downloaded using the below download link according to Time-limited Trial license. IcebergLock Protector download file is only 24 MB  in size.
IcebergLock Protector was filed under the General category and was reviewed in softlookup.com and receive 5/5 Score.
IcebergLock Protector has been tested by our team against viruses, spyware, adware, trojan, backdoors and was found to be 100% clean. We will recheck IcebergLock Protector when updated to assure that it remains clean.

IcebergLock Protector user Review

Please review IcebergLock Protector application and submit your comments below. We will collect all comments in an effort to determine whether the IcebergLock Protector software is reliable, perform as expected and deliver the promised features and functionalities.

Popularity 10/10 - Downloads - 113 - Score - 5/5

Softlookup.com 2023 - Privacy Policy



Category: General 
Publisher: Iceberg Software Lab
Last Updated: 16/11/2023
Requirements: Not specified
License: Time-limited Trial
Operating system: Windows
Hits: 605
File size: 24 MB 
Price: Not specified


Leave A comment
Name: *
E-Mail: *
Comment: *