You can also create the server search list of a WibuKey client "manually" in the registry (with regedit.exe). Here you have to differentiate between the settings for the users and for the computer. If more
How can one easily determine via console whether the WibuKey kernel drivers are running? Under Windows enter the command wku32.exe in the console at C:\Program Files (x86)\WIBUKEY\Bin. Under macOS and more
In general, it was examined which possibilities our driver software "offers" foreign code to potentially carry out manipulations on systems. Please note that the security of protected/encrypted applic more
In case of trouble with the WibuKeyShellExtension there might also be other difficulties. Therefore, we recommend a clean uninstall and reinstall as described in KB-0016. If the difficulties refer exc more
FIPS is an optional security feature in Windows that restricts the use of some .NET Framework classes. The idea is that only specially selected crypthographic implementations should be used. More info more
Since WPF/Xaml/Prism applications work a lot with reflection, it cannot be easily guaranteed that the obfuscated names of methods, fields, etc. will be entered everywhere instead of the original names more
If you want to sign your assembly, you must do so after the encryption. AxProtector .Net offers the possibility to specify the keys for the signing as parameters and to sign the assembly created durin more
This performance loss is a known issue. It occurs because your original code is "moved" to a secure place, and AxProtector code is placed at the original address when encrypting your assembly with AxP more
With an AxProtector version 11.10 or newer from CodeMeterSoftware Development Kit (SDK) version 7.50 or newer a warning is displayed, i the license for using AxProtector is about to expire. You should more
AxProtector has the option --isprotected , which provides information about the AxProtector encryption of any file. With this you can control, for example, whether an application is already protected, more
To use WupiData, a HiddenData field without dependencies must be programmed into the CmContainer. By default, a Product Item Option has dependencies whose values must be known so that the programming more
To test IP Protection (exclusive protection without licensing), you need an additional license in your Firm Security Box (FSB): 100021:1600. This license is available as a demo version on request from more
The cause of the error is that Java 7 (or lower) is installed on the system. Since Java 7 is no longer supported by Oracle and AxProtector technology has also evolved, Java 7 for performing encryption more
To encrypt Java applications compiled with Java 9 or newer, at least AxProtector version 10.10 is required. If an older AxProtector Java version is used in conjunction with Java 9, an error (incompati more
On encrypting Spring applications Wibu-Systems recommends to customize the following AxProtector options: Creating of valid Java class files To ensure that Spring on start is properly interpreting you more
This error message usually occurs, if the AxProtector components were packed into the JAR archive when building the application or the JAR archive. Even if, for example, you use Wupi functions and hav more
The AxProtector option '-a' was used in the past to place the AxEngine at a previously reserved area during encryption. This was necessary when the application did not provide enough space to accommod more
This message occurs during encryption with AxProtector, if there is not enough space in the application to accommodate the AxEngine. To fix this, you need to create your application with a larger File more
AxProtector .NET provides several attributes via WupiEngineNet.dll that can be used to target the protection of specific namespaces, classes and methods. The attributes are called Protection and Licen more
When using AxProtector .NET elements can be specifically excluded from obfuscation by using attributes. For this purpose, the obfuscation attribute from the System.Reflection namespace can be used. Th more