Each Rockey 2 dongle contains a globally unique Hardware ID for developers to identify the device. HID is the unchangeable ID that has been burnt into the dongle during production.
The enveloper tool can protect the executable program with well-designed shell encryption technique. No extra developing work is required.
ASM, ASP/PHP, Delphi, PowerBuilder, Python, Fortran, Java, RealBasic, Oracle, SQL2000, FoxPro, VB, VBA, VC, C# and VB.NET etc.