Solved

Anyone used Shrinker?

Posted on 1998-05-03
2
158 Views
Last Modified: 2010-04-06
I am planning to use a compression program to protect my trial versions from hacking. It seems that there is only one program available for Windows EXEs. It's Shrinker from Blink. Before I go for it, I would like to know if someone has used it? Or, if there are other such programs around?

Thanks,
Sanjay
0
Comment
Question by:skanade
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 3

Expert Comment

by:Matvey
ID: 1340866
Sily advice: try to make a search for +executable +compression ...
0
 
LVL 4

Accepted Solution

by:
itamar earned 20 total points
ID: 1340867
Hi skanade,

I didn't use Shrinker comercially but I tried it with some of my executables (big ones) and even DLL, and it works fine. I also tried with Netscape executable and had no problems.

If you want to know, I myself wil register Shrinker as soon as possible...

IHTH,
Itamar
0

Featured Post

VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE

Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Hello everybody This Article will show you how to validate number with TEdit control, What's the TEdit control? TEdit is a standard Windows edit control on a form, it allows to user to write, read and copy/paste single line of text. Usua…
In my programming career I have only very rarely run into situations where operator overloading would be of any use in my work.  Normally those situations involved math with either overly large numbers (hundreds of thousands of digits or accuracy re…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month4 days, 7 hours left to enroll

635 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question