gunterg
December 20th, 2004, 05:08
WARNING - The Following Self Promotional Claims Have NOT Been Verified By ANY Credible Source
Themida 1.0
I believe that the author is the same than the Xprotector
Kernel Mode operation in all Windows platforms: Ring0 technology in most of the internal protection engines; Anti-debugger techniques that detect/fool any kind of debugger; Anti-memory dumpers techniques for any Ring3 and Ring0 dumpers; Different encryption algorithms and keys in each protected application; Anti-API scanners techniques that avoids reconstruction of original import table; Automatic decompilation and scrambling techniques in target application; Virtual Machine emulation in specific blocks of code; Advanced Mutator engine; SDK communication with protection layer; Anti-disassember techniques for any static and interactive disassemblers; Multiple polymorphic layers with more than 50.000 permutations; Advanced API-Wrapping techniques; Anti-monitors techniques against file and registry monitors; Random garbage code insertion between real instructions; Specialized protection threads; Advanced Threads network communication; Anti-Memory patching and CRC techniques in target application; Ring-0 garbage code insertion between real instructions; metamorphic engine to scramble original instructions; Advanced Entry point protection; Debugger interrupts emulation; Dynamic encryption in target application; Anti-tracing code insertion between real instructions; Advanced Anti-breakpoint manager; Real time protection in target application; compression of target application, resources and protection code; Advanced kernel mode decryption layers; Anti-“debugger hiders” techniques; Full mutation in protection code to avoid pattern recognition; Real-time simulation in target application; Intelligent protection code insertion inside target application; Random internal data relocation; Possibility to customize dialogs in protected application; Support of command line; Many many more...
199€
A expensive little do you not believe?
http://www.oreans.com/
Themida 1.0
I believe that the author is the same than the Xprotector
Kernel Mode operation in all Windows platforms: Ring0 technology in most of the internal protection engines; Anti-debugger techniques that detect/fool any kind of debugger; Anti-memory dumpers techniques for any Ring3 and Ring0 dumpers; Different encryption algorithms and keys in each protected application; Anti-API scanners techniques that avoids reconstruction of original import table; Automatic decompilation and scrambling techniques in target application; Virtual Machine emulation in specific blocks of code; Advanced Mutator engine; SDK communication with protection layer; Anti-disassember techniques for any static and interactive disassemblers; Multiple polymorphic layers with more than 50.000 permutations; Advanced API-Wrapping techniques; Anti-monitors techniques against file and registry monitors; Random garbage code insertion between real instructions; Specialized protection threads; Advanced Threads network communication; Anti-Memory patching and CRC techniques in target application; Ring-0 garbage code insertion between real instructions; metamorphic engine to scramble original instructions; Advanced Entry point protection; Debugger interrupts emulation; Dynamic encryption in target application; Anti-tracing code insertion between real instructions; Advanced Anti-breakpoint manager; Real time protection in target application; compression of target application, resources and protection code; Advanced kernel mode decryption layers; Anti-“debugger hiders” techniques; Full mutation in protection code to avoid pattern recognition; Real-time simulation in target application; Intelligent protection code insertion inside target application; Random internal data relocation; Possibility to customize dialogs in protected application; Support of command line; Many many more...
199€

http://www.oreans.com/