After watching the video tutorial, and after protecting your software and going to the Keys Generator, section 1,2,3, and 4 out of 16 sections was selected. Why was section1,2,3,4 selected, and how do you decide or know which sections to select and what do they mean?
Bigkang
Search found 6 matches
- Fri Jul 19, 2013 12:31 am
- Forum: Basic
- Topic: Select sections for decryption
- Replies: 1
- Views: 9784
- Mon Jul 15, 2013 6:31 pm
- Forum: Basic
- Topic: Extra Enigma Files
- Replies: 1
- Views: 7819
Extra Enigma Files
After protecting my exe file, I noticed there were three additional files written by Enigma to the same directory, and they were ".enigma", ".enigmaform", and ".Keys". Should these files by deleted, or should they stay with the protected file?
Bigkang
Bigkang
- Thu Jul 11, 2013 3:30 am
- Forum: Basic
- Topic: Protect All
- Replies: 1
- Views: 7682
Protect All
Once my software is configured and protected, can I use the same software with all users, and the software will remain protected?
Bigkang
Bigkang
- Mon Jun 24, 2013 11:52 pm
- Forum: Problems
- Topic: Program not protected
- Replies: 1
- Views: 5454
Program not protected
I configured my program to run as a trial for 10 Executions, and after the 10 execution, the registration box open, but I clicked on RUN, and the program loaded. After closing the program out, I clicked on RUN again, and the program loaded again. Please tell me how I can prevent that from happening ...
- Mon Jun 03, 2013 3:05 am
- Forum: Basic
- Topic: 32 bits vs 64 bits
- Replies: 1
- Views: 8470
32 bits vs 64 bits
If I purchase Enigma Protector, which is the best version to purchase that will work and be most compatible on both the 32 bit and 64 bit computers?
- Fri May 31, 2013 8:50 pm
- Forum: Basic
- Topic: How to protect my program and get registration from User?
- Replies: 10
- Views: 45103
How to protect my program and get registration from User?
How can I protect my program that can be accessed by many users, and each user will send different registration numbers to me, and I send them the code to to make my program operational.
Bigkang
Bigkang