AxProtector has the option --isprotected , which provides information about the AxProtector encryption of any file. With this you can control, for example, whether an application is already protected, more
To use WupiData, a HiddenData field without dependencies must be programmed into the CmContainer. By default, a Product Item Option has dependencies whose values must be known so that the programming more
To test IP Protection (exclusive protection without licensing), you need an additional license in your Firm Security Box (FSB): 100021:1600. This license is available as a demo version on request from more
This message occurs during encryption with AxProtector, if there is not enough space in the application to accommodate the AxEngine. To fix this, you need to create your application with a larger File more
AxProtector .NET provides several attributes via WupiEngineNet.dll that can be used to target the protection of specific namespaces, classes and methods. The attributes are called Protection and Licen more
When using AxProtector .NET elements can be specifically excluded from obfuscation by using attributes. For this purpose, the obfuscation attribute from the System.Reflection namespace can be used. Th more
Since AxProtector version 10.70, there is a new runtime library cprsrt.dll for .NET, which must be available at runtime. This library is secured with certificates to enable encrypted communication and more
FIPS is an optional security feature in Windows that restricts the use of some .NET Framework classes. The idea is that only specially selected crypthographic implementations should be used. More info more
Since WPF/Xaml/Prism applications work a lot with reflection, it cannot be easily guaranteed that the obfuscated names of methods, fields, etc. will be entered everywhere instead of the original names more
If you want to sign your assembly, you must do so after the encryption. AxProtector .Net offers the possibility to specify the keys for the signing as parameters and to sign the assembly created durin more
Please proceed as follows: Call the encrypted application. Please adjust your proxy information. java -Dhttp.proxyHost=proxy.company.local -Dhttp.proxyPort=8080 -jar application.jar Alternatively you more
The date is set to this value after the encryption to guarantee that several encryptions of the same application are binary identical - otherwise the modification date would be different. Alternative more
The error 1001 means "FileNotFound". It occurred since your WkFirm.wbc file has not been found. The WkFirm.wbc file is required for programming licenses and encrypting applications. You should have re more
With AxProtector Java 10.20, the encryption of a Java application that contains an 'Index.list' will abort with an error. For example, if you were using AxProtector 10.10 and a JAR archive with an 'In more
This error message usually occurs, if the AxProtector components were packed into the JAR archive when building the application or the JAR archive. Even if, for example, you use Wupi functions and hav more
With an AxProtector version 11.10 or newer from CodeMeterSoftware Development Kit (SDK) version 7.50 or newer a warning is displayed, i the license for using AxProtector is about to expire. You should more
AxProtector offers various options for debugging protected applications. AxProtector Option -cce To examine a dump file of an encrypted application/dll compared to the original code, you should use th more
Problem: Using an encrypted "fat binary", i.e. an application that contains 32-bit and 64-bit components, can cause problems on macOS. Solution: The application should be split for use/encryption to c more
The AxProtector option '-a' was used in the past to place the AxEngine at a previously reserved area during encryption. This was necessary when the application did not provide enough space to accommod more
1. Overview of the processing status of the report tasks. The command to get an overview is as follows: select finished+0, failed+0, locked+0, count(*) from report_task group by finished, failed, lock more