With the general development of the computer users'skills, program integrity is facing more and more challenges. The programs which have been viciously modified and the pirated ones are harming users'and companies'interests. This study introduces one way to protect the program by using the program shells, as well as the principle and some common behaviors inside the shells. The study then gives a detailed explaination of an existed shell, and some code segments of a test shell. The study also introduces other common methods used to protect programs, pointing out their weak point and drawbacks, and gives ways to make a blueprint for the program protection. |