Pyramidal Protection System | Your (Visits Daily:1 | Page Refresh:1) | Other Visitors:5455
  • Quick Presentation on Protection System
  • Pyramidal Protection System (.NET EFP)
  • This explanation is for programmers with at least one year of experience on .net
  • System Description:
  • It is a new system written by language C, C ++, Assembly to protect the .net software (source code) of (reverse engineering, decode and re-code assembly that was written to build programs), protection through new EFP file. We will explain it later.
  • It has been named as the pyramidal protection system because it consists of a set of programs, small-sized files working and dealing with each other in a pyramid to make only one program with a centralized point that controls the administration, operation, and also in the collapse of the pyramid and end, all the programs that operate under the framework in the event of any breach of Terms of Use.
  • It is divided into two systems, the first one is for the EFP protection, which is for programmers and the second one is like a runtime, that runs on the user device that is responsible for operating the system.
  • Parts of the system work continuously for self-protection, and all parties will complement, so that work together as one unit left.
  • Also capable of continued advocacy on all programs that is running in and analysis before any attempt to obtain information or data protected system.
  • The system will not stop operating since the protected program starts until is closed properly, then the system takes care of erasing all information stored in the as shown in the photo.
  • Description (Executable file Protected)
  • is a new file type and a format created by CEFP to convert the original file that is written by the language. It converts the structural system protected vet system does not work as because it has other properties as explained below.
  • System Explanation:
  • Engineering system consists on the construction, management and operation of from several small-sized programs with high-speed and dealing with each other in a coordinated manner. It is not allowed to make the parts work only with the other part supplementing it to become a pyramidal manner as shown in the picture.
  • - Is protection system (encrypts text, obfuscation, compressing, anti-read Assembly and encrypt resources) working?
  • Protection system is a new different working variation of the protection programs, because in fact .Net works slowly to some extent, depending on the level of the programmers, operating systems and the speed of devices with which, if you add all these types already mentioned, it will not run the program or very slow. Unfortunately there are many programs that work for reverse engineering to decode and read the lines of code as shown in the following picture.
  • Therefore this system is designed differently, a re-creation of the composition building operating file and convert from EXE to EFP , encrypt and add new recipes and methods of protection, operation and verification of the owner and the protection of data version, and other new qualities that will remind them of the department set up .
  • Explanation of the Parts of the System
  • Guidance, assistance, and messages:
  • Help Message Box []
  • This section is designed to guide the user the appearance of guidelines on how to output messages or operating errors or misuse, cannot control this part of a system or its complementary, such as waiting until the approval of the message, or shut down the system or one of its parts.
  • Clarification
  • As we know that the messaging system shows a welcome message or an error that forces to press approve or cancel the message and after running the program implements the following command, and this is a security hole through which steal some data from memory, it does not close the program and all the data loaded on the memory unless the approval of the message to get out.
  • Therefore it is designed to show the assistance and correct mistakes like this, it only shows a message but do not force you to press any button, and that a separate segment itself has nothing to do with the performance and the speed of the system software, because it appears when its required. It does not take part on the performance of the program or closing.
  • When showing a message is required, the message appears on the system after ending the program, when it comes to the security part as shown in the following picture.
  • If it’s a message of guidelines for how to use something, the message will appear without shutting down the system.
  • EFP File Creation
  • Create EFP []
  • The creation of the file after checking the original file (exe that was created under the .Net framework) of the virus and ensure property rights and conditions of use.
  • Explanatory statement for the establishment and operation of EFP.
  • After running specialist for the establishment of the program and the introduction of version data and the verification of ownership is created, the file will keep operating and will talk about it in the boot partition and the building operator.
  • Terms of use:
  • We do not support or participate in any illegal protection program or an abuse of human rights, such as data theft and piracy, viruses, spyware and pornographic programs, dredgers programs, etc.
  • Steal data’s, hacking, introducing virus, spyware & software porn, etc.
  • - What about the violation of the Terms of Use?
  • Terms of use of the investigator is working to send a report in the case of detection of any violation of any type of the species mentioned before. Added to the list of our website and banned the purchase, and use any follow us online program in order to protect others from the hands of abusers.
  • - Can there be exceptions in the terms of use?
  • Terms of Use are clear, but if the offence has been unintentional, such as the protection of the content of encrypted program, carries a maximum degree and considered by some anti-virus programs, it is normal and there is nothing wrong if either intentionally will not tolerate it.
  • - How is the process of EFP Creation?
  • The program works very simply, indicating at all times all you need to create it. It will ask the data owner and the company name, program type, program name, a serial number, a link Internet to e-mail and the original language used as .vd, .net, c # .net.
  • - How the EFP creation recognize the original owner?
  • The program recognizes the original owner of the file that was created under through checking lines of code and give the right to add a version data and the creation of and for the safety of property rights.
  • After entering the required data, click on the “Create” button and it will get a new file.
  • Advanced Properties
  • Advanced Properties EFP []
  • EFP carries the version information file (the manufacturer of the program and the program name and description, version number and property rights, as well as Internet and e-mail link for customer service, date created, name, file type, and size).
  • Therefore, this section is designed to show this data to the user when they are needed.
  • Advanced properties appear in the list of the window with right click on any.
  • file.
  • When the data is verified, click on the "OK" button to exit the program.
  • Verification of the owner before running:
  • Author Verification []
  • The program recognizes the original owner when is used with AV. That gives the right to the system by giving permision to the user. (This will be explained in the Department of programs run after protection) It works and deals as a mediator between the protection system, application operation and the user of the program, which operates under the .NET framework to have full permission of use.
  • Also is a link to all parties, tool are not allowed to work and not to give any validity to run, unless they are sure of the secret number (that we will talk about in operating request) to connect the parts of the system and the operator to do the work.
  • The verifies your PIN, and cleans the memory RAM from any information remaning as shown in the following image.
  • Operating request
  • Invoke with Secret Key []
  • It is the one that makes the system run by the protected file EFP. Sends the file name and PIN, this is another advantage of the system features. It does not work unless you enter the verification number of ownership of the program that was created under the .Net framework.
  • - What is a PIN, what are the advantage of it, and how it is used?
  • Secret key consists on 0 to 32 letters, numbers and symbols, is made by the owner as he pleases and is added within the lines of protection code, as shown by the following instructions:
  • Operating PIN Features:
  • It is the one that allows the operator (will be explained in the Department of programs run after protection) to make sure that is the original owner of the program, and give the power to run.
  • Operator
  • The definition of Operator:
  • Operator is a small size program and the appropriate application of the operating system circle, which we have talked about it earlier: the main destination for the program Icon with the name of the program on the list of the processor.
  • Operator features:
  • It has many great features and confidently exchange between the parts of the system in operation, and the protection tool.
  • It is the operating code words explained as we know that the EFP is not working automatically, such as exe not own dedicated Icon is expressed and cannot program code change, therefore Operator is fully functional instead of EFP to become possessed the full attributes of protection, operation and data version, property rights and a symbol of operating.
  • - How does the operator work and what language is used?
  • Operator works by sending a request of the concerned part by the file name and number of the operating system source which is .
  • - Which language can be used to create operator?
  • You can run EFP in any language you prefer such as C, C++, C++. Net, C # .Net, VB.Net by using invoke.dll. But I prefer to use in terms of speed and performance.
  • Example of the use to run.
  • Explain the use of to run:
  • 1- Start “Visual Studio” and then click on the “File menu”, and then “New”, and then choose a new project.
  • 2- Select the C++ from the menu that appears on the left and then choose the general and after “Empty Project”, and then fill in the data source, the name of the project, and the general name for all projects.
  • 3-After press the “OK” button, the establishment of the empty project.
  • 4-Press the name of the project “My Project” with the right click then choose to add and then a “new item”.
  • After you add a “New item” to create page, the lines of code will be written.
  • Now, “copy and paste” the following lines and put in a code page.
  • Now you must adjust some of the settings and the creation of Operator as shown in the following pictures:
  • 1. Right-click on the name of the project with rice and then choose “Properties”.
  • 2. Picked from the menu that appears on the left and then "Linker".
  • 3. Debugging and choose instead the values as shown in the picture
  • 4. Finally set up "Operator" to become, exe ready to work and run EFP. Press the "Right click" on the name of the project and then choose to “Build” and you will find the program file in the "My Project \Debug".
  • Now you must EFP and the operator's assembly in one container and then run the program. Operator should work successfully.
  • For more information, please visit the website and follow the explanation video and audio to all parts of the system and deal with it, methods of protection and operating.
  • http://www.it-tu.com/pps/explanations
  • http://www.it-tu.com