Software Encryption Methods: The currently adopted encryption methods can be divided into two major categories: key disk method and encryption lock method. An encryption lock is also a popular encryption tool nowadays. It is a combination of software and hardware encryption product that plugs into the computer's parallel port. A normal encryption lock has tens or even hundreds of bytes of non-volatile storage space available for read/write operations, some even have an added microcontroller inside. During software operation, it writes specific data into the parallel port and determines whether the returned encrypted data is correct to check if the encryption lock exists. This method is not easily hard-decrypted, thus having the advantage of reliable encryption. However, it also has one big disadvantage: high cost, and inconvenience for users. If a user purchases several software programs with encryption locks, they have to constantly switch the locks when using different software or changing computers, causing a lot of trouble.
What is Soft Decryption? Soft decryption refers to the use of software monitoring and analysis during software operation to see what data is written to the encryption point and what data is returned from the encryption point. Then, before running the software, a self-compiled program is resident in memory to supervise the encryption point. When the software writes data to the encryption point, the software automatically replaces the encryption point and returns corresponding data. Thus, the encryption product is simulated by software. Another approach is to modify the statement that determines the existence of the encryption point in the software, directly jumping to the normal execution part of the program. The drawback of this decryption method is that it may decrease the stability of the software and cause errors due to incomplete decryption.
What is Soft Cloning? Soft cloning refers to reading out the dog data from the original version of the encryption lock using relevant tools, writing it into an identical model of the encryption lock, and modifying the binding data corresponding to the encryption lock in the software to achieve cloning. Different brands of encryption locks have different characteristic data. For example, for Rockey 4 encryption locks, the characteristic data related to the software is the password of the encryption lock. Therefore, changing the password in the software to match the password of the encryption lock in hand achieves soft cloning. The advantage of this method is maintaining the stability of the original software and avoiding incomplete decryption; the disadvantage is that it does not support software upgrades. After upgrading, manual modification of the software's characteristic data is required. For software with strong encryption shells, this method is not very feasible.
What is Hard Cloning? Software developers use hardware encryption to protect their software from being casually cloned. Commonly seen are USB hard dogs and parallel port hard dogs. Dog types include Safenet, CenSi, Feitian Rockey, YuZhiTian, Hasp from Israel, etc. Normally, these dogs cannot be directly read, but specialized equipment like card readers can read the corresponding encrypted data inside the hard dog, and card writers can perfectly write data into an empty dog, thus achieving perfect cloning of the hard dog. Of course, this only applies to some hard dogs, not all. Another method is to hard clone using software. Some brands of encryption locks leave backdoors for production convenience to change the data in the dog. Thus, software can be used to read the contents of the encryption lock, modify the relevant characteristic data, and write it back into the dog to achieve hard cloning. Our site's uniquely created Rockey4 hard cloning technique uses this technology to achieve hard cloning.
What is Hard Simulation? Hard simulation refers to smart dogs (such as Rockey 6, Sense 3, Sense4). Since the program and data files inside the smart dog cannot be read, through software analysis and combining with the original dog, the program algorithm inside the dog is deduced, or the import/export data of the original dog called by the software is monitored, and the data returned to the software is simulated through self-written programs to achieve cloning. This method requires strong analytical skills, so the hard-cloned dogs on the market are actually hard simulations, not true hard clones, because the program inside the dog cannot be obtained. Many customers are easily deceived, thinking it is a hard-cloned encryption lock.
What is Virtual Dog? Virtual dog is a relatively advanced soft simulation method in encryption lock cloning. A virtual dog is a virtual bus device that communicates with the encryption lock's driver program through a special kernel driver program. It can be vividly called a software-based encryption lock on the computer, commonly known as a software dog. The advantage of the virtual dog is that it doesn't require software modification or driver modification, and its functionality is completely the same as a hardware dog. Writing virtual dog programs requires extremely high software programming skills and a deep understanding of the characteristics of the virtual dog to possibly create a virtual dog. Therefore, the technical content of this type of technology is very high and not something ordinary people can achieve.
What is Simulated Driver, What is Version Irrelevant? As everyone knows, under Windows, software needs to call drivers to operate hardware. Hardware is just the interface provided by the driver program to the software. This driver interface is usually provided by the software dog company and generally does not change. How this interface specifically works is invisible to the software. Simulated driver simulates the interface between the software and the hardware, achieving the function of this interface through software programming. The hardware code of the encryption lock is encoded in the driver program, and the algorithm of the encryption lock is transplanted into the driver program. Thus, for the software, it seems to be operating a real hardware device. Regardless of how the software version changes, the driver interface remains unchanged because the driver and the software program are separate, no need to modify the program file, achieving simulated driver and software version irrelevance.
We mainly specialize in services related to cloning, hard simulation, and hard cloning of encrypted USB dongles. Technical QQ: 1601500861 QQ:1600188506 QQ:2598881561 QQ:2598966556 CenSi Lock(SenseLock) encrypted USB dongle, Feitian FTSafe encrypted USB dongle, SafeNet encrypted USB dongle, Jianshi encrypted USB dongle, YuTian encrypted USB dongle, NetCom encrypted USB dongle, Longmai encrypted USB dongle, Aladdin encrypted USB dongle, and other types of encrypted USB dongle cloning, simulation, PJ!
2012 Latest Information: Perfect cloning of CenSi 4, Feitian R6, JingRui e R2 R4 R4ND MicroDog SoftwareDog S3 DomainHeaven Longmai!
Note: We only undertake the business of encrypted USB dongle cloning, first-hand source without selling software! If you think we are dog dealers, please do not contact us. Thank you for your cooperation!
Related theme articles: CenSi Lock, JingRui IV, Spirit Lock, Encrypted USB Dongle Replication, Standard Edition Professional Edition Encrypted USB Dongle Replication.