(This article is written in Chinese, no knowledge of PE file format is required, and no programming skills in assembly or C language are required. Some encryption algorithms are directly provided by Yiyu. For special encryption algorithms, you can translate C language code, assembly code or VB code. In this article, the word "Cracker" is translated as "traitor", which means "traitorous villain". I have always hated crackers. Some people say that crackers have a role in the development of software in our country, but I am wrong. Look at Microsoft's monopoly on the operating system and the software industry due to piracy. Living in the loopholes... If this goes on, the software authors will have no income, and there will be no more excellent software to be launched. It is my duty to avoid piracy. I think the launch of this book can strengthen the encryption ability of Yiyu users and kill piracy in the hands of everyone. This book integrates the exposés of several authors, and I would like to express my gratitude at the same time. Some of the text content has been modified based on the characteristics of Yiyu. The author's name is not signed in the article to avoid deliberate cracking of their software by traitors. With the increasing number of people who use Easy Language to compile programs, the situation that writing a software is easy to be cracked by an adulterer is also increasing. Some users even doubt whether Easy Language is safe. From a technical point of view, I can only say that encryption technology has nothing to do with programming language. The security of a programming language usually refers to whether the generated machine code is stable and reliable, rather than anti-cracking. If you want to avoid cracking well, So mastering an encryption technique is very necessary. This book takes into account that most of the users who use Easy Language are not familiar with the PE file structure, so it does not choose a very low-level method to educate, but chooses the method of direct expression with Easy Language to explain how to encrypt.)