contents

products
 
CrypKey breaks convention with 'True Encryption' for .NET

CrypKey Inc., a leading global provider of software copy protection and license management solutions, is pleased to announce the launch of what it believes is one of the only available "true encryption" protections to date of .NET software.

The company has launched CrypKey 6.5 with true encryption of .NET software, rather than the generally prevailing obfuscation methods that attempt to confuse hackers by disguising code but which can be significantly easier to circumvent.

"Some companies claiming to offer .NET protection are not necessarily able to actually provide it, " notes CrypKey CEO Jim McCartney. "Some are using obfuscation-making code more confusing to prevent reverse engineering -- as a means to deter hackers; however, encryption is a much stronger method of protecting .NET software than obfuscation."

.NET, Microsoft's newest platform for development, is relatively easy to effectively reverse-engineer, explains McCartney. CrypKey believes its newest product is far more effective in attempting to protect .NET applications than obfuscating methods. "Encryption is the best way to protect software from unauthorized usage because it offers a meaningful level of copy protection that is more thorough than obfuscation methods. Also, the level of protection is scalable and can be driven by cost-benefit analysis."

CrypKey 6.5 provides true encryption for .NET exe's only. CrypKey has long incorporated robust customization options for licensing and is currently testing encryption of a .NET exe and dll combination. In addition to .NET exe's, CrypKey 6.5 supports all other platforms including Windows 98, Windows ME, Windows 2000, Windows 2003, Windows XP and Windows NT.

CrypKey SDK (Software Developer Kit), the company's flagship software protection solution, offers full feature software copy protection solutions and features additional customization options to meet individual needs. It was originally launched in 2002. CrypKey Instant, a similar solution, provides copy protection to prevent unauthorized use and duplication of software in mere minutes without having to write any code.



write your comments about the article :: © 2005 Networking News :: home page