Header
Stub Code
(without Intellectual Property)
CodeMoving
Encrypted
Code
The optimum in protection is achieved by
moving the code into the CmDongle and exe-
cuting it in that safe environment. This makes
it completely impossible for hackers to know
what is going on.
Encrypted
Resources
AxEngine
(Security Engine)
Protected Application
Protected Application
testing suites and would not have to continue
to earn a meager living by hacking software.
Copy protection and licensing must get to
work where they are needed in the code. One
typical strategy would be to create a license
wrapper class, but calling on that class repeat-
edly would be counterproductive: Hackers
would only have to a