Button Up

Blog

Editing the playlist after video protection

4 Jul 2018
Pavel Korobov
Pavel Korobov
If you used the SFContent.com service to protect audio and video files, you might have noticed the ‘Creating a playlist’ step in the protection process.

Such playlist is provided as an SFM3U file and can be opened from StarForce Player, the multimedia player.

This is highly convenient if you protect several files that should play back in a certain order.

How to digitally sign a program

6 Jun 2018
Tatiana Davydova
Tatiana Davydova
The users perceive an application or a driver that do not have a digital signature as a potential malware, because the users constantly encounter problems when they run the software.

Third-party antivirus software and information protection tools in the operating system will do their best to prevent the start of such software. If this is not what you aim at, make sure that your application or driver has a digital signature.  

ASPack Software: Protection of Programs for Professionals and Home Developers

11 May 2018
Pavel Korobov
Pavel Korobov
StarForce Technologies in its line of products and online services has another interesting family of solutions, which may not have been heard by everyone. Today I want to introduce you them if you did not know anything, or update your memories if you have forgotten something.

We are talking about the ASPack Software products: ASPack, ASProtect 32 and ASProtect 64. Unlike StarForce ProActive, these ones are affordable for any software developer. That's why it can be interesting.  

How to Arrange Software Licensing

23 Mar 2018
Natalia Yashenkova
Natalia Yashenkova
Software licensing is used to protect the developer’s intellectual property (copyright) and to specify how the end users can use the software. Licensing helps the developer or the publisher protect their software products from piracy (i.e. illegal software distribution and use) and from software changing (the publishers of online games are fighting with cheaters and the developers of corporate systems are not interested their clients to change the code on their own).

Software licensing implies creating a license agreement and restricting the software use in some way.

How to open SFMEDIA files?

15 Feb 2018
Pavel Korobov
Pavel Korobov
If you received files with an unfamiliar SFMEDIA extension and don't know what to do with them, so our article is written especially for you. This file type was developed by StarForce Technologies to protect video files using the SFContent.com service. You can open SFMEDIA files in the StarForce Player app, which is available for downloading and installing on devices operated under Windows (x86, x64) and macOS.

Files of this format are protected videos and audios. Protected means they can’t be played without entering a license key that the publisher provides along with the files.

How to Introduce and Promote Software Products

29 Jan 2018
Natalia Yashenkova
Natalia Yashenkova
Among our clients, there are often companies that have just created their products, as well as companies that decided to sell a product they have created for themselves. First, of course, they need to protect their software from copying, hacking and modification, but they want to tell the world about the new product and arrange product sales as well.

At StarForce Technologies, we focus on the tools to protect software from a wide range of threats. All StarForce products provide protection from reverse engineering and modification. We offer a C/C++ source code obfuscator that works as a syntax analyzer. StarForce Crypto allows you to prevent the hacking and unauthorized use of executable files. You can implement protection from copying and illegal distribution with the help of DRM.

Protection methods against screen grabbing

21 Dec 2017
Pavel Korobov
Pavel Korobov
One of the key functions of the SFContent.com security system is the protection against screen capturing by software methods (by Print Screen function or specialized software capable to provide screen copying).

Depending on the operating system, the service uses several ways to combat the screen grabbing and video recording for the users' convenience and to increase the level of security.

This will never happen to us!

14 Nov 2017
Svetozar Yakhontov
Svetozar Yakhontov
I have taken to mountaineering a couple of years ago. I am currently mastering the five-thousanders of the Caucasus; the plan is to climb the seven-thousanders of the Pamirs. Each time before the trip, the members of the crew are debating.

Should we take helmets? Or is it just added weight? Should we take ice drills for the safety stations, in case someone falls in a crevasse? But this adds 300g per person.

Or we’ll better to stick to the rope team. Appeals to security reasons and references to statistics of accidents are not always convincing. We are sure bad things will never happen to us.

Copy Protection with DRM

27 Oct 2017
Natalia Yashenkova
Natalia Yashenkova
DRM (Digital Rights Management) is a system that allows you to control access to digital content and applications. DRM enables the technical part for licensing the digital content, software, games, etc.

The purpose of DRM is to provide access to the product for the users who have bought it, and to block access for those who do not have the legal right to use your content. DRM usually includes copy protection as well as different restrictions for example, time or area limitations.

Email tracking and protection against leakage

27 Sep 2017
Natalia Yashenkova
Natalia Yashenkova

I mostly use Outlook to work with emails and from time to time I feel a necessity to track the opening of my emails by the addressees. There are a lot of email trackers for Gmail but only a few are capable to work with the Windows client correctly. The idea of email trackers is old enough to invent tools to block email trackers. For example the Ugly email service detects components of some trackers and on the site you can see what trackers can be blocked.

And sometimes cruel monetization comes, as it happened with Signals when a CRM absorbed the tracker and now it is available only as a part of a big system on chargeable basis. So search of a good tracker never stops.


Pages: 1 2 3 4 5 Next All