Copy Protection and License Control for Software, Video and Content

+813-444-3589+44-118-901-0173+49-231-976765-0 | Contact us

Best practices for using ProtectUSB

The following are best practices for using ProtectUSB solutions that will help assure efficient and trouble-free production.

Selecting USB flash drives

  • USB flash drives consist of several components; PCB board, USB connector, controller chip, memory chip, and case. Poor quality components can affect the performance and even cause the drive to fail in the field.
  • High-quality drives with Tier 1/Grade A, branded original memory should be used. Original memory is manufactured by Samsung, Toshiba, Intel, Micron, and Hynix. You should see the brand name on the memory chip if opening the  drive case.
  • Alcor controllers are recommended, however Silicon Motion (SMI) and Phison generally work well.
  • Samples with protected content should be tested on both supported operating systems for both Mac and Windows before placing bulk orders.
  • Certain controllers support hardware write-protection. This has nothing to do with the content encryption. The content will be encrypted regardless, but hardware write-protection allows physically locking the drives so no files can be added or deleted.
  • You can find a list of controllers that support hardware write-protection in the USB Tools directory after installation of ProtectUSB Content or ProtectUSB Software.

Configuring your operating system settings

  • Do not run any anti-virus software (this includes out-of-the box solutions as Windows Defender). Disabling is often not enough and uninstalling is highly recommended. Anti-virus software is known to cause system instability issues (especially in connection with USB drives) and causes a huge resource drain when writing to a large amount of USB drives in parallel.
  • Disable power-saving schemes of the computer used for writing.
  • Disable auto-insert notification (e.g. as described here: https://technet.microsoft.com/en-us/library/cc959381.aspx).
  • Disable the Search Indexer Service.

General computer hardware considerations

  • You can connect significantly more USB2 devices than USB3 devices. Therefore, if you don’t specifically aim at USB3, it is recommended to use USB2 controllers and USB2 hubs (or USB3 hubs connected with USB2 cables) for the duplication.
  • You should keep the USB hub device tree flat by connecting as many hubs as possible directly to the root USB hub instead of “daisy chaining” from one hub to the next.
  • One USB root hub can control up to 127 endpoints, which is hubs and USB sticks. Since a physical hub often contains multiple logical hubs and a USB stick usually contains 2 end points, you can connect about 50 USB sticks per root controller for USB2. With USB3 this is a fraction, often about 1/3.
  • In addition to the root hub on the motherboard, you can add additional USB controller cards. It is no problem to mix different bus types such as PCI-Express or PCI. Note that although these cards may have multiple connections, they still have only one (max. 2) root hubs.
  • The computer you use for writing should be well equipped with RAM to be able to cache the source data. Processor speed is less important and even older models generally do fine.
  • Source content must be located on a fixed hard drive and cannot be prepared from a USB drive to prevent overload of the USB buses.
  • The fixed hard drive should have a minimum of 3 times larger than the total size of the source content as well as another 1 GB of drive space for operating system housekeeping.
  • Use high quality, separately powered USB hubs with as many ports as possible (>10 ports per physical hub is a good number).
  • Make sure the hubs you use are stable, preferably hard mounted to a solid underground and the ports are easily accessible (e.g. from the top) as you will insert/remove a large number of sticks.
  • Use hubs with LED indications for inserted/active sticks. This way you can directly tell if an inserted stick is working.
  • The USB sticks you use are an important (very often dominating) factor for the overall speed.
  • Do not change/disconnect hubs as this breaks the physical layout’s port associations.
  • If you switch on power to hubs with inserted sticks, do this one by one and not all at the same time.
  • Be aware that the first symptoms of the computer not being able to handle the amount of sticks are random non-working ports. In this case, you should reduce the number of ports/sticks and/or change your configuration/components to stabilize the system.

Configuring the ProtectUSB software

  • IMPORTANT: Using the “Strict Mode” is highly recommended. This mode is turned on in the Settings of the “Write Flash Drives” app. Strict Mode requires that the License checkbox is enabled, that the sticks report the necessary information, and forces a bit-to-bit verification of the data written on the sticks to the source data. This will help assure that the sticks you duplicate work in the field. Of course, you should also have a good quality assurance process in place as well.
  • The source data for the duplication should be on a fixed, local drive (no network share or removable ). This is especially important if you write the data on multiple computers in parallel. This way the network load is reduced and the network or USB bus does not become a bottle neck.
  • You need to define a physical layout and map the ports of your hubs to it. This has the following benefits:
    • You will get a warning if a port/stick is not detected correctly
    • You are able to directly identify a failed stick’s physical location after the write process
  • It is critical that the sticks are written using the same Product ID as used when the content is packaged during the content preparation. If they are not the same, you will get a media cannot be authenticated when running a duplicated stick.
  • You need to define a physical layout and map the ports of your hubs to it. This has the following benefits:
    • You will get a warning if a port/stick is not detected correctly
    • You are able to directly identify a failed stick’s physical location after the write process

Operating hints

Implementing a QA process

  • We recommend implementing a quality assurance plan to minimize the chance of corrupted or defective sticks from shipping to your customers. This plan should include:
    • Checking protected drives on all supported platforms on the initial run and spot checking passes during production. The best practice would be to check a drive from pass on each duplication system on both Mac and Windows.
    • Checks should be performed on Mac and Windows computers other than those computers for the packaging and duplication.
    • You should make certain to re-package any content if a new version of the Flux Player version has been released in ProtectUSB Content.
    • If duplicating the same content on multiple systems, we recommend using a app such as TeraCopy (http://codesector.com/teracopy) with verification to assure the data is not corrupted during transfer.

Troubleshooting during production

  • If you will get a “Media cannot be authenticated” error when running a duplicated stick, confirm that the sticks are written using the same Product ID as used when the content is packaged during the content preparation. This is critical as the Product ID identifies the content and must be the same in both the packaging and writing process or the authentication process will fail.
  • If you have confirmed the Product ID is correct and tested the drive on a different computer, try using a different brand/model flash drive to learn if the result is the same. If so, contact your account representative or This email address is being protected from spambots. You need JavaScript enabled to view it.

Working with Physical Layouts

ProtectUSB allows you to create a map of the physical layout for the hubs/slots you are using for duplication. This physical layout representation enables you to directly locate the position of every stick, for example if a stick fails.

Defining the pyhsical layout is a two step process. In the fist step you define the layout and in the second step you assign each slot a position. Once you have completed the definition, it is displayed for every duplication process.

Note: If you have defined a physical layout and run a duplication job with more than one stick inserted, you'll get a warning message, if a stick is not detected in every port. this assures, that a (faulty) USB stick does not pass as undetected. If you are intentionally not using all ports, you can ignore the warning.

Step 1: Select the physical layout of the ports

In this step you simply have to mark the positions from the slots of your hubs in the displayed matrix. For example if you have two horizontal hubs, each with 10 ports, it could look as follows:

port layout small

Note: You can leave rows or columns free to keep the layout clean.

Step 2: Insert flash drives and identify related ports

In this step you need to assign every port a position in your layout. To do this, you need to insert a stick into a port and then select the position for this port in the layout. You need to do this for every port.

insert stick small

In the above step you see a USB stick animation for every port you have assigned. This means you have to insert exactly one USB stick into one of the ports. Once the software detects the insertion, it will switch to the next step.

 

assign port small

In this step each undefined position is identified by a question mark. You have to select the position for the inserted USB stick. In this example, we have inserted it into the top left position and and so click on that port. Once this is done, the selection changes back to the stick insertion and the selected stick is displayed with it's coordinates as shown in the screenshot below.

 

selected insert next small

Now the stick position is defined and you can insert the next stick at the next position. Once you have done this for all positions, you are done.

Note: You can use a different stick for each port and keep all inserted sticks at their position or you can use one and the same stick by removing it after you selected the position and then place it into the next position.

 

 

ProtectUSB Content FAQ

Below are the frequently asked questions regarding ProtectUSB Content. 

Protection Questions

Q: Can I use any USB flash drive/USB stick/pen drive?

A: Yes, there is no limition to the size or chipset you can use. And you can simply try it out by using the demo functionality.

Q: What files can be protected?

A: You can directly protect complete Video DVDs (all menus, etc.), videos (MP4, MOV, M4V), images (PNG, JPG), PDFs, ePubs, MP3s and HTMLs. Some file types like Word, Excel, Powerpoint, etc. need to be converted to HTML before they can be protected. All of this can be tested by using the demo functionality.

Q: Can I restrict printing, saving, copying and annotations of PDF documents?

A: Yes. ProtectUSB Content automatically restricts the saving. For printing, copying and annotations you can use the regular PDF settings.

Q: What devices are compatible to ProtectUSB Content?

A: The protected content can be accessed from Windows, MacOSX and Android.

Q: Can I write protect the USB flash drives so that the content cannot be accidentally deleted or modified?

A: Yes, USB flash drives can be set to read only by hardware and software write protection. The hardware protection is very secure but works only with controller chipsets from SMI, Phison and Alcor. The software write protection is less secure because it can be reset by a user with administrative rights.

Q: Can I add additional, also unprotecte files to the protected flash drives?

A: Yes, no problem.

Q: Can I reuse protected USB sticks with new content?

A: Yes, you can exchange the protected content on protected USB sticks as often as you want wihtout the need to purchase a new license.

Q: Can I mix software and content on a protected flash drive?

A: Yes, you can mix software and content. However, the software will not be able to access the protected content as both are protected separately. 

 

Production Questions

Q: How long does the writing/protection take?

A: The majority of the process is the copying of the data to the USB flash drive. The time mainly depends on the speed of the source and the USB flash drives.

Q: Can I write to multiple USB flash drives in parallel?

A: Yes, no problem.

Q: Is Protect USB compatible to duplicators and mass manufacturing?

A: Yes. ProtectUSB Content has a special mode for mass manufacturing and can also work with stand alone and connected duplicators. With stand alone duplicators the licenses are added to the already prepared USB flash drives in a separate step. Conneted duplicators can be used directly as target for the complete duplication process.

General Questions

Q: What exactly can I do with a license?

A: A license allows you to "license" exactly one USB flash drive. There is no limition on how much content you write to the USB flash drive.

Q: Do the licenses expire?

A: No, licenses do not have an expiration date.

Q: Can I transfer licenses from one computer to another?

A: No, once issued, you cannot move licenses from on PC to another. However, if a PC breaks, you can contact support to replace the remaining licenses. 

Q: Can I split the purchased licenses to multiple PCs?

A: Normally this can't be done. However, if you order bigger quantities, you can request a split in advance to the order.

Q: How can I try before buying?

A: When you download ProtectUSB Content and try to prepare data or write a protected USB stick, you are asked to log in. If you want to use it in demo mode, just click "Cancel" or "Demo" to continue in demo mode. 

Q: What are the restrictions of the free demo mode?

A: The only restriction is that you will have a demo message before the content is presented.

Q: Can I pay any other way than credit card?

A: If you want to order larger quantities, we also accept wire transfer. Just contact us.

 

If your questions are not answered, please contact us here

ProtectUSB Content FAQ

Hier finden Sie Antworten auf häufig gestellte Fragen. 

Fragen zum Schutz

Q: Kann ich jeden USB Stick bzw. jedes Flash Drive verwenden?

A: Ja, es gibt keine Einschränkungen bzgl. Größe oder verwendetem Chipsatz. Sie können es einfach mit der kostenlosen Demofunktionalität ausprobieren.

Q: Welche Dateitypen können geschützt werden?

A: Sie können komplette Video DVDs (mit allen Menus, etc.), Videos (MP4, MOV, M4V), Bilder (PNG, JPG), PDFs, ePubs, MP3s und HTMLs schützen. Einige Dateitypen wie Word, Excel, Powerpoint, etc.müssen vor dem Schutz zu HTML konvertiert werden. Sie können alles mit der kostenlosen Demofunktionalität ausprobieren.

Q: Kann ich bei PDF Dokumenten drucken, kopieren und speichern verhindern?

A: Ja. ProtectUSB Content verhinder automatisch jede Speicherung. Für Drucken, Copy&Paste und Bemerkungen können die dafür vorgesehenen PDF Einstellungen genutzt werden, welche von ProtectUSB Content berücksichtigt werden.

Q: Welche Plattformen sind mit ProtectUSB Content kompatibel?

A: Die geschützten Inhalte können unter Windows, MacOSX und Android verwendet werden.

Q: Kann ich die geschützten USB Sticks mit einem Schreibschutz versehen, damit die Daten nicht modifiziert oder weitere Daten hinzugefügt werden?

A: Ja, USB Sticks können mit Hardware- oder Software Schreibschutz versehen werden. Der Hardware-Schreibschutz ist sehr sicher und funktioniert mit Controller Chipsets von SMI, Phison and Alcor. Der Software-Schreibschutz ist weniger sicher, weil er von einem Nutzer mit Administratorrechten zurückgesetzt werden kann.

Q: Kann ich zusätzlich zu den geschützten Daten auch zusätzliche Dateien auf den USB Stick schreiben?

A: Ja, kein Problem.

Q: Kann ich die Inhalte auf bereits geschützten USB Sticks austauschen?

A: Ja, die geschützten Inhalte auf einem bereits geschützten USB Stick können ohne weitere Kosten beliebig oft ausgetauscht werden.

Q: Kann ich Software und Inhalte auf einem geschützten USB Stick mischen?

A: Ja, Software und Inhalte können gemischt werden. Allerdings kann die Software nicht auf die geschützten Inhalte zugreifen (weil diese ja geschützt sind). 

 

Fragen zur Produktion

Q: Wie lange dauert das beschreiben bzw. der Schutzvorgang?

A: Der allergrößte Teil der Zeit wird für das kopieren der Daten auf den USB Stick verwendet. Die genaue Zeit hängt dabei von der Geschwindigkeit des verwendeten Geräts, der Schnittstelle und der USB Sticks ab.

Q: Kann ich gleichzeitig auf mehrere USB Sticks parallel schreiben?

A: Ja, kein Problem.

Q: Ist Protect USB kompatibel mit Duplikatoren und Großserienfertigung?

A: Ja. ProtectUSB Content hat einen speziellen Modus für Großserienfertigung und kann auch mit verbundenen und separaten Duplikatoren genutzt werden. Bei separat betriebenen Duplikatoren wird die Lizenz in einem zweiten Schritt unabhängig von den Inhalten aufgebracht. Verbundene Duplikatoren können direkt als Zielsystem genutzt werden.

Allgemeine Fragen

Q: Was genau kann ich mit einer Lizenz machen?

A: Eine "Lizenz" ermöglicht die Erstellung von genau einem geschützten USB Stick. Dabei gibt es keine Einschränkung bzgl. der Größe der Inhalte oder wie oft die Inhalte modifiziert werden.

Q: Laufen die Lizenzen ab?

A: Nein, Lizenzen haben kein Ablaufdatum.

Q: Kann ich Lizenzen von einem Computer zu einem anderen übertragen?

A: Nein, sobald die Lizenzen für einem Computer ausgestellt sind, sind diese an den Computer gebunden. Sollte der Computer nicht mehr zu verwenden sein, werden Sie sich an den Support, um die restlichen Lizenzen ersetzt zu bekommen. 

Q: Kann ich die erworbenen Lizenzen auf mehrere Computer aufteilen?

A: Im Normalfall ist dies nicht möglich. Allerdings können größeren Bestellmengen nach Ihren Vorgaben aufgeteilt werden. Fragen sie vor der Bestellung entsprechend nach.

Q: Kann ich vor dem Kauf erst testen?

A: Nach dem Download von ProtectUSB Content haben Sie beim Programmstart die Möglichkeit die Demo Option zu wählen. In diesem Fall benötigen Sie kein Logindaten. 

Q: Welche Einschränkungen hat der Demomodus?

A: Die einzige Einschränkung ist die Anzeige einer Demomeldung bevor die geschützten Inhalte dargestellt werden.

Q: Kann ich mit einem anderen Zahlungsmittel als Kreditkarte zahlen?

A: Wenn Sie größere Stückzahlen bestellen möchten ist auch eine Zahlung per Rechnung/Überweisung möglich. Melden Sie sich bei uns.

 

Ihre Frage ist nicht dabei? Kein Problem, fragen Sie uns hier

ProtectBURN Software

Introduction

This guide explains how to protect and burn Software DVDs with the ProtectBURN Software application together with the Protect Software web site for protecting executables, DLLs and PDF files.

With ProtectBURN Software it is possible to protect and burn regular DVD-Rs in a copy protected way directly from an existing DVD or ISO image. 

Requirements

To use ProtectBURN Software the following is required:

  • A Software/Content Publisher or FlickRocket account to the Protect Software/FlickRocket web site
  • Operating System Windows XP and later
  • Standard DVD burner and write-once media (DVD-R / DVD+R)
  • DVD burning software
  • 17 GB free hard drive space
  • Internet connection to perform the executable and DVD protection and purchase burn licenses

Workflow

The workflow of creating a protected DVD with software is basically very simple. However, it is important to understand which steps are required and how the licenses (or missing licenses) influence the created DVDs.

To create a protected software DVD the following steps are required:

1. Creating a Product

A product links protected executables, dlls or PDF files to a certain protected DVD. Protected executables, dlls or PDF files accept only DVDs as original, which are protected by using the same product.

2. Protecting the Executable, DLL or PDF file

The Executable, DLL or PDF file is protected by specifying the product and the protection settings. For doing this the file to be protected is uploading to the Protect Software web site where it is protected and made available for download after the process completes. Each protected file contains a unique watermark which can be used to trace back possible leaks.

3. Creating the DVD to be protected

The protected executable, dll or PDF is combined with all other files for the DVD and a DVD image is prepared by using standard mastering software such as Windows integrated DVD burning or tools such as Nero, ImangeBurn, etc.

4. Applying the protection to the DVD

The protection for the DVD is applied. As part of this the same ProjectID that has been used for protecting the DVD needs to be specified. The result is an encrypted DVD image that can be burned on computers with ProtectBURN.

5. Burning the DVDs

In this step you burn the protected ISO. Depending on the availability of burn licenses, the DVDs will be burned in DEMO mode with warning message or as regular copy protected DVDs. Please see the table below for details.

License availability / Configuration ProtectBURN installed / Burn licenses available ProtectBURN installed / No burn licences available ProtectBURN not installed
Resulting DVD Successful burn of DVD with copy protection Successful burn of DVD with warning message Broken DVD

 

The warning message which is shown when a DVD is burned without a burn license looks as follows and will disappear within 30 seconds.

content sample wait message 

To burn without the warning screen, you need to purchase licenses. 

Purchase Burn Licenses

You can purchase burn licenses from the Protect Software Burn Licenses Web shop. To get there select the “Buy Licenses” option from the Protect BURN Tray Application.

Protect burn tray window

After you select the “Buy Licenses” option, your browser will open and display the web shop for the burn licenses.

Protect burn content order licenses

The web shop offers different packages of burn licenses. The higher the number of purchased licenses is, the lower the price per license gets.

After the purchase completes, the licenses are automatically transferred to the local computer if you press the “Issue License(s)” button.

Issue ProtectUSB Licenses

Important! One “burn license” is valid for exactly one burn. This is independent of the protected DVD. So, with 10 burn licenses, you can protect 10 DVD-Rs of one title or you can also use them for 10 different titles with one protected DVD-R each.

Setting up a product 

Every protectied executable/app is assigned to a specific Product. Products are created in the web admin interface.

new software product

Note: The screenshot above shows the product creation for a company that does not have ESD (electronic software distribution) enabled. If ESD is enabled, additional information has be specified. 

Protecting an Executable or App

For Software protections the executables/apps need to be protected to become robust against hacking attempts and check for exactly the correct USB stick/UnlockCode/Purchased license to be present for validating the permission to run.

To protect one or more Executables/Apps the “Products -> Protect executable/app” function must be used.

Protection Options

General

Use these settigns to specify fundamental properties such as which potection to use and which product is assigned.

protect exe general

Option Description
Profile A profile enables you to save the protection options. If you frequently protect executables/apps with identical options, it saves you time and reduces the chance of errors to create a profile. When loading a profile, all saved options are applied. 
Protection Version This selection enables you to slect the version of the protection. Sometimes there migth be different versions with different features sets to select or you might be able to use an older version. This can make sense if you have done your testing with a version which was availabel before a new version got released and you don't want to retest nor you need the new functionality.
Product

Each protected executable is linked to a product which uniquely identifies the execuable. If don't have a product defined yet, you need to do this before you can protect the execuable/app. 

If you use the "Purchase" option, the shop uses product related options for pricing, UnlockCodes, etc.

More information about the selected product is diplayed below the product selection.

License Settings

Use these settings to define the behaviour of the excutable/app such as whether or not it can be purchased, if a media is validated, if a demo/trial version is offered, etc.

protect exe license settings

Option Description Visibility
Purchase

None:

With this option the executable does not require being purchased from the FlickRocket web shop nor does it require an UnlockCode for working. This is for example a typical setting if the executable/app is locked to a protected media such as CD/DVD/USB stick or the protection serves to prevent re-engineering.

Purchase via integrated FlickRocket web shop:

With this option the protected executable/app requests a purchase from the FlickRocket web shop if no valid license from such a purchase (or other validation such such as original media) exists. The web shop is managed in the web admin interface.

Purchase via entering UnlockCode:

With this option the protected executable/app requests an unlock via UnlockCode if no valid license from such an UnlockCode (or other validation such such as original media) exists. UnlockCodes are created and managed in the web admin interface.

Always
Rights Validation

Offline license:

With this option the license validation is performed offline via a device specific license file. An internet connection is only required at the time the license is stored. The software can work without internet connection.

Online check:

With this option the license validation is performed online. Because of this, a near constant internet connection is required. The advantage to offline licenses is that it is possible to share a single license over multiple work places as long as the number of concurrently allowed licenses is not exceeded.

Only with purchase option
DRM System Admin use only Only with offline license rights validation
Demo/Trial

With the demo/trial option the protected execuable will run in demo/trial mode with the limitations defined below, as long as it is not purchased via the FlickRocket web shop or by UnlockCode.

The FlickRocket shop offers the possibility to offer a file protected with this option as demo/trial version to potential customers as part of the shop.

Only with offline license rights validation
Time Limitation This time limitation defines how long potential customers can use the protected software. During and after the time frame, they can select to purchase the software, depending on your previous settings, through the FlickRocket web shop or via UnlockCode. Only with offline license rights validation and demo/trial option
Update Level The update level is used to enable customers whose demo/trial period has been exceeded to use a new trial/demo period for an updated execuable. If a new demo/trial period should be possible, the update level needs to be increased. Otherwise, exceeded demo/trial periods will stay exceeded also for new versions. Only with offline license rights validation and demo/trial option
Physical Media Check

This option defines if, when and how often an original media (CD/DVD/USB Stick) is validated to allow the protected software to run. For software which is sold online or unlocked via UnlockCode this is typically set to "No media check". For software distributed on copy protected media typically one of the "Check..." options is selected.

It is possible to combine media checking with online purchase or UnlockCode unlocks. In this case the protected software will run once one of the validation options is true.

Always
Media Type If media check is enabled, this option defines which media type is checked. Select the media which you plan to protect and use for the distribution of the protected software. Only with media check
Check Type

Admin check:

This check type requires admin privileges at the first run of the software (or install). It is the most secure checking method but should not be used in enviromenments (typically office/big organizations) where the customer might not have administrative rights for accessing his computer.

Standard check:

This check requires only standard user rights. It is somewhat less secure but is the only option for some enviromenments (typically office/big organizations) where the customer might not have administrative rights for accessing his computer.  

Only for CD or DVD-R media check

Design Customization

Use these options to modifiy the text/design of the protected executable/app.

protect exe design

Option Description
Customized Startup Logo This logo is displayed during the startup/checking process of the protected executable
Text/Localizations This option can be used to upload modified (and previously download) string tables for the protected execuable. Every text displayed by the protection can be changed and additional languages can be added by uploading this file.

Advanced

Use these options to manage an expiration date for the execuable/app, which is independent of the license. 

protect exe advanced

Option Description
Expiration date If specified, the protected executable will cease to work at this date. This feature is for example used for software with expiring data - so that the application cannot be started once the data expires.
Update level The update level is used to enable customers whose expiration date has been exceeded to use a new/updated protected execuable. If a new use should be possible, the update level needs to be increased. Otherwise, exceeded expiration dates will stay exceeded also for new versions, even if a new expiration date is specified.

Finalizing the protection

After applying the protection you can download the protected executable to be used for the disc to be protected.

protect exe upload

Protected executables history 

The Protect Software web site holds an archive of protected executables. You can access this archive by selecting “Products -> Protected executables history”.

The site lists the settings you used for the protection and allows you to download the protected executable as well as protect a new file using identical settings.

Create ISO image

If your protected executable or app is part of an installation, you need to build the installation, add any other files that are required and create a DVD image.

To create the DVD image you can use any software capable of creating ISO images such as the free ImageBurn. There are no special requirements on how the DVD Image is created and what file systems or file names are used.

Protect ISO image

This chapter describes the “Protect .ISO image” function step by step.

Step 1: First page / Optional Settings

The following wizard will shop up.

protect burn disc protector welcome

When you see the “Welcome” page, click on “Next”. If this is the first time you use this function, the option dialog will appear and you are able to enter some default settings. 

Option Description
Default source path Default path to the directory specified here when browsing for source data.
Default destination path Default path to the directory specified here when browsing for a destination folder.
Temporary path This path will be used to store intermediate data. Specifying a hard drive different from source and destination can speed up the processing time.

 

Step 2: Login

The next page shows the account data you are currently using.

protect burn disc protector login

Step 3: Source 

Now you need to specify the ISO image you have created earlier. If you have created the ISO image directly previous to this step, it might already be filled in and you can click “Next” to continue. 

protect burn disc protector source

Step 4: Enter ProjectID

This page shows the ProjectID for the protected DVD. It must be identical to the ProjectID specified when preparing the content. 

protect burn disc protector product

Step 5: Destination

Now you need to specify the destination for the protected ISO image. If you have created the ISO image directly previous to this step, it might already be filled in and you can click “Next” to continue.

protect burn disc protector destination

Step 6: Processing the data

Your ISO will now be processed and the protected output ISO image is created. Depending on the speed of the hard drives/network connections this will take some time because up to 15GB of data is transferred.

protect burn disc protector process

Burn ISO image

Important: The protected ISO can be burned with any compatible burning Software if ProtectBURN is installed and active (which requires a reboot after installing) on the computer. This is only an example - using the free ImageBurn.

Protect burn content imgburn

During burning please always note the pop-ups displayed by the ProtectBURN tray application. These pop-ups will inform you about the remaining licenses.

Protect burn license count

Important! If no burn licenses are left, burning is still possible, but the resulting DVD will display the warning message that this DVD is not allowed for distribution.

Frequently asked questions

Following you find a list of the frequently asked questions. If this does not answer your question, please contact This email address is being protected from spambots. You need JavaScript enabled to view it..

I forgot my password. What can I do?

You can use the “forgot password” function of the www.protect-software.com web site.

I have purchased more burn licenses than I need on this computer. Can I transfer them to another computer?

No. Licenses are only valid on the computer on which they have been purchased.

I want to use the protected DVD as source in a burning tower. Is this possible?

No. The DVD has a copy protection and copying the DVD is not possible, especially not with keeping the protection.

I want to perform an industrial replication of a protected DVD. Can I use the protect ISO image of the protected DVD as source?

No. The protected image is encrypted and the protected DVD is copy protected.

Can I use ProtectBURN Software also for Video DVD protection?

Not this software but you can use the ProtectBURN Video to do this.

Can I use the protected image with automated duplication devices?

Yes, as long as the data written comes from the computer on which the ProtectBURN software is installed.