The content between "protect begin" and "protect end" is encrypted using 256-bit AES algorithm.Usually it's unbreakable unless you know the encryption KEY.
回复 4#fl_5588
Ask those who provide you the protected codes. The protected codes are created using a tool which requires users to enter the KEY.
If they do not enter any KEY, the tool will generate a default KEY using proprietary algorithm.
Unfortunately, I don't know such algorithm and can't help you.