473,657 Members | 2,493 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

copy prevention and time limiting

access fe and access be. later the be might be sql server

I don't want people to pass this application around. And I want control over
usage. I want it to 'expire' after a while.

I have fairly good control over the install.

I have (probably?) prevented unauthorised distribution thus:

I have a module which checks the HD partition volume number. If it isn't the
one I installed it on then application.qui t. I call this function in the
open of several key forms. It gives an 'error message' before the quit which
is the actual vol number. Just in case the client formats the HD or installs
a new one or something. Makes it easy for me to create another working
version.

Time limiting so far isn't really time limiting. Checks the autonumber PK of
a few key tables. When it get's to n issues warning, but works. When it gets
to n+50 app.quit.

This is all in the FE. The BE is his data obviously. Can do what they want
with that.

I distribute it as an encrypted MDE.

I imagining how people might try to get round it:

A clever programmer could work out what's happening, back up the data, empty
the tables, re-import some of the data and they're off again. A lot of the
data is historical and it wouldn't be a big deal if it was lost. So maybe if
reaching n+50 sets an invisible control on a form to 'outahere' which is the
thing which fires the app.quit. So once that number of records has been
reached any amount of resetting of PKs won't help. I thought of doing the
same thing with real time values. So that resetting the system clock won't
help them.

Of course this all assumes that they client can find an access developer who
is prepared to work out what is going on and attempt to get round it.

Opinions? I mean on the technical merits of this. I know some people think
just to not bother and trust clients. That's up to me.

Jo



Nov 13 '05 #1
2 1594
Is this for a demo-application?

Why not just limit the time ?
If Date > xxx then Application.qui t (with an appropriate warning that the demo has
expired)
IME my apps always are date-dependent, so resetting the system clock would bother them
more than it would bother me ....

Resetting the systemclock would affect almost *everything* they do with their PC.
If they just want to 'play' some longer with your app, well let them be.
If this is to deliver a time-limited demo then maybe I would also count the records in
some tables, and deny adding more.
If this is *not* a demo but a real application the client pays for, then I wonder if *you*
really have the right to quit their application ..

--
Hope this helps
Arno R
"Jo Davis" <j@j.com> schreef in bericht
news:42******** *************** @news.aaisp.net .uk...
access fe and access be. later the be might be sql server

I don't want people to pass this application around. And I want control over usage. I
want it to 'expire' after a while.

I have fairly good control over the install.

I have (probably?) prevented unauthorised distribution thus:

I have a module which checks the HD partition volume number. If it isn't the one I
installed it on then application.qui t. I call this function in the open of several key
forms. It gives an 'error message' before the quit which is the actual vol number. Just
in case the client formats the HD or installs a new one or something. Makes it easy for
me to create another working version.

Time limiting so far isn't really time limiting. Checks the autonumber PK of a few key
tables. When it get's to n issues warning, but works. When it gets to n+50 app.quit.

This is all in the FE. The BE is his data obviously. Can do what they want with that.

I distribute it as an encrypted MDE.

I imagining how people might try to get round it:

A clever programmer could work out what's happening, back up the data, empty the tables,
re-import some of the data and they're off again. A lot of the data is historical and it
wouldn't be a big deal if it was lost. So maybe if reaching n+50 sets an invisible
control on a form to 'outahere' which is the thing which fires the app.quit. So once
that number of records has been reached any amount of resetting of PKs won't help. I
thought of doing the same thing with real time values. So that resetting the system
clock won't help them.

Of course this all assumes that they client can find an access developer who is prepared
to work out what is going on and attempt to get round it.

Opinions? I mean on the technical merits of this. I know some people think just to not
bother and trust clients. That's up to me.

Jo



Nov 13 '05 #2
"Arno R" <ar************ ****@tiscali.nl > wrote in message
news:42223d15$0 $44098
If this is *not* a demo but a real application the client pays for, then I
wonder if *you* really have the right to quit their application ..


It's an application the client rents from me.

Jo
Nov 13 '05 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

3
3381
by: David Sharp | last post by:
I'm working with some long standing VB/SQL Server applications and for the second time we've suffered from having the parameters to a stored procedure call get silently truncated now that the data field has got much larger than when the code was developed all those years ago. This is always very hard to debug and I'd really like SQL Server to throw an error when this happens. I don't feel confident enablying the full ANSI_WARNINGS as it...
4
3373
by: leke | last post by:
I have been lurking here for a while and I have noticed some people writing about problems with their sites being hacked. As I am fairly new to this scene so I don't want to fall into vulnerable coding styles early on or even worse have my first site used as some type of porthole for spammers. Can anyone recommend a good book or online resource about web site hacking prevention. Even something along the lines of how to hack web sites...
16
5138
by: Michael Kujawa | last post by:
Hi All, I have been given a site to redo. In the process of looking at the code, the live site is open to SQL injection. I know what needs to be done but limited time right now to redo correctly. In the interm while I am rewriting the site, will adding a few lines of code as below prevent SQL injection until I have the time to rebuild the functions and move to stored procedures. Basically client side I added a onKeypress javascript...
0
1983
by: dunleav1 | last post by:
Does enabling/disabling Data Execution Prevention (DEP) have a performance impact on SQL 2000 or SQL 2005?
5
6435
by: P | last post by:
I was wondering what sort of changes I need to make in order to make an application to be DEP compatible with on Windows XP x64 version 2003. I have compiled an open source C application (japach:http://www.jikos.cz/jikos/japach/) but when I ran it on Windows with DEP turned on, I get a core file and inside that, it says "STATUS_ACCESS_VIOLATION". After searching through Google, most of the results came back were on making an exception to...
1
2118
by: blangela | last post by:
3.0 Advanced Topic Addendum There are a few cases where the C++ compiler cannot provide an overloaded assignment operator for your class. If your class contains a const member or/and a reference member, the compiler will not be able to synthesize an assignment operator for your class. It actually helps to think of a reference member as a const member (since it cannot be made to reference any other object once it has been initialized). ...
0
890
by: herpes prevention | last post by:
herpes prevention generic acyclovir herpes simplex disease
9
7804
by: dpatel75 | last post by:
I am trying to copy a database from a SQL 2000 SP3 Windows 2000 server to a 2005 SP2 Windows 2003 server. I am trying to use detach and attach method (have tried both within Management Studio and T-SQL) and experience an error when attaching to the 2005 server: "CREATE FILE encountered operating system error 5 (error not found) while attempting to open or create the physical file 'xxxxxxxxxxxx' (Microsoft SQL Server, Error: 5123)" I have...
14
8459
Frinavale
by: Frinavale | last post by:
I've been trying to test my web application using Internet Explorer 8 (release candidate 1) and have been experiencing some major problems. I'm hoping you can help me with this one. I have a JavaScript Object that tracks the horizontal scroll position of a <div> element on the page. It sets a hidden field so that when the page is submitted to the server, the server code is able to retrieve the current scroll position. When the page is sent...
0
8325
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
0
8844
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
8742
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
1
8518
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
7354
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
6177
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
4173
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
0
4330
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
1
2743
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.