Don't just obfuscate your scripts, encrypt them as well - Reliably obfuscating a script is a big deal all by itself, but when that same script is also encrypted AND executable, you now have on your hands a truly protected script that cannot be exposed. With our Encryption tool, you can confidently and conveniently secure all scripts written in interpreted languages such as perl, directly from your own private host!
There's a limited number of tactics a hacker can use to try to hack a protected script. We are aware of every one of these methods and we watch for them. If a user of your protected script attempts to sniff around your code, our automated mechanism will detect this and will automatically transform the protected script into a deceptive state, leaving the troublesome user chasing his own tail.
Every enScryption.com protected source code is encased in a number of obfuscated layers of encryption which ensures human eyes are prevented from viewing the initiation and subsequent run of the protected script. What that means is, whenever your script runs, we guard the entire process during which it interacts with the operating system so it cannot be intercepted!
We log all hack attempts on a protected script in the event a devious user tries to figure out how it is being protected. During encryption, you can choose to specify whether or not your script should run if there isn't any internet connectivity. Internet connectivity helps ensure you're informed whenever users of your script violate licensing terms. Or, at the time of encryption, you can set your encrypted script to work only for a specific user(s) and/or on a specific list of host(s)