Tamper-Proofing is to Code as Encryption is to Data
Tamper-proof your code with one of White Hawk’s NEST products and avoid:
- Reverse engineering
- Virus attachments
- Run time spying
- Being surprised by attacks
- Code corruption
- Any code modifications
- I/P code copying
We enable precise control of your protection process since the protection scripts are under control of the original software author. No special training is required to use these tools.
The protection script is specific to the protected program and even to specific attacks (if you wish).
It is NOT simply encryption. It is NOT a virus checker. It does NOT protect the data – it protects the code. These tools check the Good Stuff (white hats), no matter what the Bad Stuff (black hats) might be or who owns the computer. They are a lot more than obscuring the code through obfuscation – they protect the application itself and prevent modifications of any sort.
See this article for a detailed discussion on What is software tamper-proofing?