@
utopiomania: What you keep forgetting is one fact - if you code something of your own and shove in a commercial protector, then you're not the god who defeated the cracker. You may act like it (as in - "no one can crack this, muhahaha") - yet you gain nothing, no respect, no nothing. Well, from people that matter. The common user will always kiss your ass.
Back to CodeVirtualizer and EXECryptor, no matter how you put it, they all use SDKs. Those have been researched to death (
quosego can confirm it regarding
Themida and myself can say the same about
EXECryptor) and are facing an obvious "meltdown". EC hasn't evolved in years, its developers basing the product on the premise that using HARDCORE anti-debugging will stop the reverser from analyzing the core of the protection. They were right.. for a while

Then came the darkness, product was discontinued and bold reversers took charge in. I can name a few people I respect who've done great amount of work regarding this protector (mostly russian fellows).
I agree with
sky. He posted a very nice way to keep people away for a short period of time. You shouldn't be mad at us - we're doing intermediate tasks - you should be mad at those bold enough to defeat RSA-1024 and products that are more popular than 100 combined PureBasics
People keep on forgetting ZWT, LZ0, BRD, FFF and other powerful names out there..
P.S. 1: RES, SND and many other teams out there are formed from people with one goal - to EVOLVE - through any means. Being a team is what really matters, and not the name. You should know that..
P.S. 2: Correcting a bit what sky said - you can defeat reversers that way, but don't forget the CARDERS

With at least one valid license, your "story" is over..
I rest my case..
And do post your crackme..