WebtoolMaster Software
Menu
Products Downlaod Download Order

Products:

WTM Copy Protection
EXE Stealth
EXE Bundle




Impressum / Imprint

SiteMap
ExeStealth Protector - More profit with less illegal copies.



Order:
(Register
unlimited application-packs)

Buy now copy protection

(Register
one application-pack)

Buy now copy protection

Exe Stealth Protector

EXE Stealth

Technical:
EXE Stealth can protect most of the executable files that are compatible with PE format. However, not every executable file is compatible with EXEStealth and other PE protectors. A problem can enter the compiler or if it uses a loader with data submitted after the loader.

Way:
Our EXE tool has its own loader that protects your file with high cryption. This allows the creation of a crypto key to start your file. This tool brings you a lot of freedom in changing from full version to shareware or demo in minutes. You can have a full serial manager with machine id and expiry date support when it is needed. Or you can protect your files against disassembler and other tools. You can bundle your file so that it starts when you have an assigned USB flash drive, CD, DVD or other medium in the computer. Here are some of the ways to go about using the program:

[Menu]
New Project
Create a new project.

Open Project
Open a saved project file. It is important that you open an old project, because when you do not open a project that you had saved of an old protected EXE, then the saved information of cryptor or the serial of keygen will not work. Because every project has an own as well as other functions. So you can create different projects and protected files on one computer.

Save Project
Always save a new project!!! This is so you do not lose the information regarding protected files. See Open Project too.

Anti "Positive false" Mode
See create stand alone file too. This function selects the best functions to make this problem decrease. This function disables some functions.

Exit
Closes the program. Do not forget to save the project when needed.

About
Here you can visit our homepage, order product page or other information.

[Function Descriptions]
Project Tab
Here you can select the file you want to protect as well as functions for the protected file.

File to protect
Select the original file you want to protect here.

Save protected file as
Here you would like to save the protected file.

Include Icons
Enable this function when you would like to have your protected file show the icons from the original file.

Include Version Information
Enable this function when you would like to have your protected file show the information of the original version (programmer name, company name, version number, ...) from the original file.

Include Manifest
This function is very important for most of the protected files. Every modern compiler and program language includes, either automatically or manually, the manifest information in the executable file. Leave this function always in the enabled mode. This function knows and scans the original file if the manifest information exists. When it does, it takes the original one from your file. This manifest needs the OS to know what graphic (XP) or user rights are needed (Vista and higher). So when you do not include this then your protected file does not work right or show old graphics (buttons, checkboxes, labels, ...) when you start the protected file. Modern OS needs this information so that they know how many rights the protected file has on the OS. When your program needs admin rights and you disable this function, then your program will not work right.

Create stand alone file
This function is useful (disabled), in dealing with problems like "positive false" or "false error" from anti-virus software. Some anti-virus tools can and will find wrong viruses or trojans in protected files. That is wrong and a nuisance that can be faced from anti-virus tools. This is very rare. This function makes 2 files. The loader and the data file with .tmp at the end name of the second file. So the loader always remains the same. But you get two files and not one when you enable this function. Select the "Anti positive false mode" in the menu for the best results.

Use Registry
The protected file must save certain kinds of information on the computer such as how often it is started, when the protected file becomes out of date, if the program is unlocked per serial and so on. These will be saved in the registry. Our tool can use two different regions.

[HKEY_CURRENT_USER]
This function needs user rights or higher. So if the loader works, it can save data on every computer with the lowest user rights. This law is from XP and higher. Each and every user who is logged in have his own current registry. So this information is saved of every single user.

[HKEY_LOCAL_MACHINE]
Here the loader needs admin rights to work correctly. The saved information is the same on admin and all other users that are logged in.

Enable Compressor
This function makes your protected file smaller when it is enabled. In the combobox you can select the rate of how good the compression is. The better the compression is and smaller the protected file becomes then slower they work. Here you can test the different rates to get the best rate for the protected file.

Remove all registry information in system
Here you can reset the saved information (serial and cryptor) of your protected file. This is very important in case you would like to test your protected file, but when it becomes expired, you must reset the expired.

Test
This function starts the protected file for testing to see if it works.

Protect
This button starts the protection.

Log field
This is a history field to get information about the ways of protecting and the information on what is wrong.
You can save or clear this data with a right click of the mouse.

[Cryptor]
Here you can select a better and more increased protection of the protected file. You can enable or disable every function. Every function can be an own text entered when you click on the Text icon on the right of the checkbox of the right function. So when a test is positive when the protected file starts, it shows the message that you selected and does not start the protected program. Most functions are disabled when the protected file is registered right. When the loader finds a serial number that worked in the registry it disable most functions in cryptor.

Anti Debugger Protection
This function checks if the protected file has been started in a debugger or if a debugger has started in the system. If the loader finds anything, it shows the message and stops. It is not disabled when the registered serial number is found.

CRC Protection
This function checks to see if the file is modified, destroyed or corrupted. It is not disabled when the registered serial number is found.

Trial Days Protection
Here you can enter in the days for how long you would like to run your program. When everybody starts the program for the first time, they give 30 days. Then the protected file does not start on the 31st day and ends. It shows the selected message and is stopped. This is disabled when the registered serial number is found.

Start Message
This function always shows at every starting in a selected text. This is disabled when the registered serial number is found.

Expiry Date Protection
Here you can select a fixed expiry date. So the program does not start on the selected date and later. This is disabled when registered serial number is found.

Start Expiry Protection
Here you can select how often the protected file can be started. This is disabled when the registered serial number is found.

Anti Virtual Machines
The protected program does not start when the loader finds a virtual machine that has been started with the protected file. So when the protected file starts in a guest machine, it shows the selected message and then stops. The normal start happens when a virtual machine is installed but starts in the host machine. This is not disabled when the registered serial number is found.

Bind protected file to a (removable) media
With this function you can bundle the protected file onto a selected drive- USB flash drives, hard discs, memo cards, discs, flash cards, and so on. It worked on most of the formatted drives, removable or not. To get this function to work, include the removable media on your computer. Then select the right drive name, example e: when the drive gets e:. The drive must be included when you protect the file. Then the signatures are automatically scanned and included in the protected file. When the protected file starts, then it scans every drive on the right signature. When the right signature is found then it starts the protected file. When this is not found, it shows a message and is stopped. This is not disabled when the registered serial number is found.

Remove information in system
Reset all settings that have been made from the crypter part in loader at the time you start the protected file in the current system.

[Keygen Tool]
Include keygen tool
When you enable this function, the protector copies the keygen tool with the right settings being automatically set in the same folder, and then your protected file with the keygen tool name EXESTool.exe is saved. Here you get your own stand alone program that members can use to register a valid serial that, when entered, gets your program protected to the fullest. This program is useful, because you can distribute this tool in your program (Note: This tool only - Not the entire EXEStealth !!!). The file name is always EXESTool.exe, but you can rename it with any name you like. Remember: Do not change the protected file name after the output name has been selected. This is because, then the keygen tool will not be able to find your protected file. Both files must be in the same folder. Check the function "The filename of the protected file" and all will be well when it is the same name as the protected file.

The filename of the protected file
This must be exactly the same as the name of the protected file after protection.

Here you can enter an information text
Here you can write texts. This will be shown when the keygen tool is opened.

In all other fields, you can give description in your language or leave the original English texts.

[Keygenerator]
This is a very powerful function of ExeStealth. Here you can generate serial keys for your members. This will be supported with the expiry date when the keys have expired. Then our tool supports the serial machine id protection as well. So the serial number works only on one computer with the right machine id. When everybody uses a right serial number to register the protected file, then some functions in cryptor are disabled automatically. See also the section titled ‘cryptor’ to know what function is being referred to. There are more ways to register the protected file. You can give your customer a member name and serial number. The user can enter them in our keygen tool and press on "Register and close". Then when all is correctly done, the protected program is registered. The second way is to generate a .key file is with the button "Generate key file". Send this to your other member. He must double click on this file and select ‘Yes’ and ‘OK’ and then the file is registered. The final way is, to use the /keyload command of the protected file. See the command line part of the loader for more information.

Enable Key Function
When you want to enable customers to make a full version of your protected file, then enable this function. When you disable it, there are no ways to make a protected file to a registered full version. So, all functions of cryptor are always enabled.

Member Name
Here you can give your members, customers or friends a name. With this name there will be created it’s own serial number. Every name has a different serial number. You can use letter and numbers. It is also case sensitive. The slightest difference generates a different serial. You can use the copy button to get this name in the clipboard.

Generated member key
When you press on "Generate Key", then our tool generates a serial number in this field. Give the member this name and serial number. This is so that he can register the protected file. Use the copy button to get the serial in the clipboard.

Set hardware key (Machine ID)
When you enable this function than the key generator creates a serial with the machine id. This is done so that all the serials created work on a single computer with the right machine id only. Your member must give the right machine id to you. This number and letter has to be typed in this field. You can use the paste button to allow you to get it from the clipboard when you copied it before. Your member can give you the number with the "Keygen Tool" when he starts it. This is because every protected file can show the right machine id with the /getmid command. Remember: Every computer has a separate machine id number. You or your customers must start the Keygen Tool or the command on the right computer that you would like to register the protected file. When you disable this function, the machine id field will be ignore.

Enable Expiry Date
When you enable this function, your serial will have an expiry date. So when you select a date in the future, the key will become valid one day before this selected date. It is a fixed date that you can select. Move your mouse over this field and you can get the calendar to select the right date. Press and select the right date. It will then be showed in the field. When you disable this function, this expiry date will be ignored.

Generate key
When you press on this function, our tool creates a worked serial number in the "Generated member key" field. When the expiry date and/or machine id is enabled, it uses this information to generate the serial as well.

Generate key file
Here you can give your members a .key file with the registered information in it. Thus if your customer starts the file with a double click and presses on YES and OK then that allows the registering of the protected file.

Set stolen keys (exactly one key per line)
Here you can lock the right and worked serial numbers. When you find illegal or worked serials in the public, then you can enter these serials here. Use for every serial your own line. Every number that is found here will be invalid on the protected files that you create after this entry. So you can set a lock on this to make the next release easy.

Remove information from the system
Here you can reset the registered saved serials only. Therefore you can remove a valid serial in the current system.

[Command line support]
Exe Stealth GUI

/lp path\projectfile.exes [path\outputFile.exe]
With this command you can protect files automatically in batch files or you can include them in the installer create process. Here you can also select the project file. This file must be created right before you use this command. Use a valid path. The output File is optional. If you leave this empty it uses the filename in the project self.
Example: c:\program folder\ExeStealth\ExeStealthGUI /lp c:\myProject.exes c:\OFile.exe

Loader - The file protector self, that is bundled with your file.

Command lines:
/keyload UserName Serial
You can register the protected file with the right serial and username. When you enter this information and the username with the correct serial then it gets registered and starts the process of the register protected file.
Example: c:\MyProtectedFile.exe John SDFG3423SARTDGSADH5
With empty space in the name, follow example 2.
Example 2: c:\MyProtectedFile.exe "John Name" SDFG3423SARTDGSADH5

/keyremove
Use this command to reset and remove the registered information from the system.
Example: c:\MyProtectedFile.exe /keyremove

/getmid
Here you get the machine id number of the machine where the protected file was started. It shows the information in a message box and closes after you press on the OK button.
Example: c:\MyProtectedFile.exe /getmid

(C) 2009 by Hanspeter Imp, Austria



Order:
(Register
unlimited application-packs)

Buy now copy protection

(Register
one application-pack)

Buy now copy protection

Download:

Size: 1 MB

Testversion:
Download

Registered Version (password protected): Download

 

 

Home Startsite Download Forum Board Imprint / Contact us Order