Software Introduction : Supported Operating System: Windows 2000/2003/XP/Vista/win7,support 32-bit and 64-bit OS; Encrypt your video files with embedding decoder and player , User needn't install any decoder or player to play your video.
you can encrypt various types of video or audio files (e. g. , wmv, avi, asf, mpg, rm, rmvb, mp4, flv, Vob) into exe files that can only be played when a Playback Password is provided, and users can only play the encrypted media files after obtaining the Playback Password provided by you.
When a user wants to play an encrypted file, the encrypted file will pop up a dialog box to request the user to enter a Playback Password. This dialog box will display the machine ID of the user's computer.
The user can send his/her own machine ID to you, and you can create a Playback Password based on the user's machine ID. After that the user can use this Playback Password to play your file on his/her computer.
Since the Playback Password is created based on the user's machine ID, the user will not be able to share the Playback Password with other users.
Since the Playback Password is bond to the user's computer, the user will not be able to re-distribute your files. You can either distribute Playback Password offline, or using networks.
Key Features : The encrypted files can beused to achieve the following: Multiple encryption modes: Non-PC-Binding, All computer ,One password; PC-Binding, One computer,One password; Video2exe, Convert video to exe only; Only need to be authenticated once on the same computer(With same Key and Product ID).
You can specify the number of playbacks allowed, and expiry date. It can be configured to disconnect the network during playback, which disallows the users to share or record the media remotely; It can be configured to prevent other windows from opening during playback; It can be specified whether free trial watching or listening is provided; You can configure a user prompt so as to let users know how to contact you to obtain the Playback Password; The encrypted files can be integrated with network authentication, and member customers can be authenticated through the network to obtain Playback Password; The encrypted files can be distributed to the users in many ways: network downloading, burned discs, and so on.
But the users must obtain the password you provided him to play the files, and you can also specify on which computer the files can be playbacked.