The Licel Developer Team is proud to announce the release of DexProtector 4.5.0. DexProtector is designed especially for Android application protection. As an input, DexProtector receives the application APK-file. An output is the protected APK-file.
September 4, 2013
May 27, 2013
Our Developer Team is proud to announce the release of Stringer Java Obfuscator 1.5.1. This version was developed in close cooperation with our clients. The Integrity Protection function adapted to protect client-side Java applications from on-fly malicious modification (by malware). Added support for applications which are designed to work in OSGI containers...
April 11, 2013
Dear friends, it is our pleasure to announce you, that our paper about Java Card development and jCardSim has been approved by JavaOne Moscow committee! To learn more about our open source project visit: http://jcardsim.org We would like to say thank you, our customers, jCardSim exists because of you! Session is planned to be on 24 of April at 6 pm in Hyderabad hall.
March 5, 2013
Greetings to all Java and Android Developers and happy Spring 2013! We are glad to report our Spring news: 1) From early March 2013 to the end of the month we have 10% off on Stringer Java Obfuscator 2) We have issued the backport of our Eclipse plugin with support of ADT r20, as many users asked for. 3) Using Stringer for Android projects protection becomes even more!
January 27, 2013
Dear users, we are glad to represent the new version of Stringer Java Obfuscator! Changes: The Resource Encryption function now supports JavaFX applications Improved internal protection scheme against popular decompilers Compatibility of applications protected by Stringer with Microsoft Security Essentials
January 23, 2013
Dear users, recently we have found that Microsoft Security Essentials detects malware/virus in stringer.jar and in your projects, which are protected by Stringer with using of Resource Encryption function. The issue connected with the way that Resource Encryption works. The function is using ClassLoader of an application, and Microsoft's anti-virus start thinking that something wrong is going on here.
November 26, 2012
- Added new function Resource File Encryption - Optimized protection algorithm - Added support for Android SDK Tools Rev. 21 - Added support for Eclipse Juno
August 27, 2012
Changes: - Added new functions: Protection from modification, Size optimization - Improved mechanism of encryption/decryption - Added fully functional GUI - Added application for MacOS X - Compatibility with Zelix KlassMaster™ - Windows 8 support - Added Export Wizard in Eclipse for Android applications - Optimized performance for Java 7 compiled applications (If using Protection from modification)
August 8, 2012
As you can see we have renamed Stringer Java Obfuscation Toolkit into Stringer Java Obfuscator, and we would like to tell you why and also announce the new version of our obfuscator. Besides the set of optimizations and fixes, we have new feature in Stringer Java Obfuscator 1.1 - protection from modification and integrity control for your Java programs. It means that if malicious user will change something in your classes the program (modified, illegal) not work at all. And this is our main reason to rename. Now Stringer Java Obfuscator not only encrypts your Strings, but offers you a great features to protect your Java applications entirely.
July 11, 2012
By buying Stringer Java Obfuscator you are supporting our open source project jCardSim. jCardSim would not exist without you, dear customers! jCardSim is an open source simulator implements Java Card, v.2.2.1: javacard.framework.* javacard.framework.security.* javacardx.crypto.*
July 11, 2012
Stringer Java Obfuscator 1.0.6 (Trinidad): - Java 7 support - Stringer now fixes incorrect stack map frames in a byte-code produced by ProGuard 4.7
July 4, 2012
The purpose of this article is to warn developers about futility of using class-file encryption obfuscators for application protection and uselessness of spending money on it. All the protection methods are described in the fundamental work of Dmitry Leskov - Protect Your Java Code — Through Obfuscators And Beyond. When we are using class file encryption method we assume that the byte-code is encrypted and when the application starts decrypted byte-code through custom ClassLoader or JVMTI-interface loads into JVM.