Each Rockey 2 dongle contains a globally unique Hardware ID for developers to identify the device. HID is the unchangeable ID that has been burnt into the dongle during production.
The enveloper tool can protect the executable program with well-designed shell encryption technique. No extra developing work is required.
ASM, ASP/PHP, Delphi, PowerBuilder, Python, Fortran, Java, RealBasic, Oracle, SQL2000, FoxPro, VB, VBA, VC, C# and VB.NET etc.
We offer complete customization options for to enable the ability of creating your very own Rockey dongle.
If you wish to request more detailed informations, specifications, quotations, or have any questions regarding FEITIAN Cost-effective Software Protection products, please feel free to contact us.