The implementation with API gives you more flexibility.
Please read our Implementation with API White Paper. It gives you a good introduction on how to start. Be sure to also refer to the samples located within the PPK as well for examples of each.
Nothing can be completely 100% secure, but there are multiple precautions you can take to make your program more protected thus making it more difficult for crackers to breach your applications protection.
More tips and details can be found in the Smarx Compendium, chapter 17.
This is not necessary. Under Windows you can use the Smarx Application Framework (part of the CRYPTO-BOX Protection Kit) to program the CRYPTO-BOX units. See Smarx Compendium, chapter 4.5 for more details.
Furthermore with SmrxProg there is a command line tool available (for Windows, Linux and Mac OS X) which takes care of CRYPTO-BOX formatting. It provides a high grade of automation, because the formatting process can be controlled within other applications or script-files. Please refer to the Smarx Compendium, chapter 7 for more details.
Many environments allow to incorporate C routines. Another possibility under Windows is using COM technology or the dynamic library cbiosdll.dll provided in the Smarx OS Protection Kit – see Smarx Compendium, chapter 10.12 for more details.
Or just contact us: In most cases we will find a solution.
Because of the nature of .NET, unprotected .NET assemblies can be decompiled easily by advanced programmers and crackers which makes it more easy to detect and remove the protection routines from your application. Therefore it is necessary to protect the code.
Here are some hints:
Furthermore, we are offering consulting and implementation support on request - please contact us to discuss your requirements.