473,466 Members | 1,298 Online
Bytes | Software Development & Data Engineering Community
Create Post

Home Posts Topics Members FAQ

Compute Name , Is it a good idea to use it for copy protection?

Hi,
I want to copy protect my application. I want to limit its use for a
given period of time, say 30 days, after which a license key will be
needed.

There are various issues to consider here like:

1)
How to keep the installation date on the user's computer so that a
simple uninstall and a complete deletion of the application's directory
and then a re-install won't bypass the protection.

So my question here is: is there a way to locate the system folder from
code and to plant a hidden text file there? Is it a good idea or are
there pitfalls? I can then check for the existence of this file.

2)
Another issue is trying to prevent the user from copying the directory
that contains the application to another computer. If the user will
already have a password, then just copying it to another computer will
enable pirated copies.

I am looking for machine specific information. I plan on having the
application provide the user with the Computer name (by clicking a
button for example), and then asking the user to send their Computer
Name to me. I will use it to generate a code which I will then return
to the user. The user will use this code to unblock the application
after 30 days.

So my question here is: Is the Computer Name a good idea for this
purpose? Can it be changed? Can different computers have an identical
computer name? I have seen a post about retrieving information about
the hard drive serial number, but another post in the same topic said
this doesn't work and it only gets information about volume and not
about the drive. Can anybody make some order in this issue for me
please?

Thanks greatly

Nov 13 '05 #1
4 1733
Computer names can be changed very easily. Simply right-click on My
Computer, select Properties from the context menu, select the Computer Name
tab and click on the Change button.
I think a far better approach is to limit how much data they can put into
the main table, rather than limit it by time.

--
Doug Steele, Microsoft Access MVP
http://I.Am/DougSteele
(no e-mails, please!)

<Gi*****@Barak-online.net> wrote in message
news:11**********************@g43g2000cwa.googlegr oups.com...
Hi,
I want to copy protect my application. I want to limit its use for a
given period of time, say 30 days, after which a license key will be
needed.

There are various issues to consider here like:

1)
How to keep the installation date on the user's computer so that a
simple uninstall and a complete deletion of the application's directory
and then a re-install won't bypass the protection.

So my question here is: is there a way to locate the system folder from
code and to plant a hidden text file there? Is it a good idea or are
there pitfalls? I can then check for the existence of this file.

2)
Another issue is trying to prevent the user from copying the directory
that contains the application to another computer. If the user will
already have a password, then just copying it to another computer will
enable pirated copies.

I am looking for machine specific information. I plan on having the
application provide the user with the Computer name (by clicking a
button for example), and then asking the user to send their Computer
Name to me. I will use it to generate a code which I will then return
to the user. The user will use this code to unblock the application
after 30 days.

So my question here is: Is the Computer Name a good idea for this
purpose? Can it be changed? Can different computers have an identical
computer name? I have seen a post about retrieving information about
the hard drive serial number, but another post in the same topic said
this doesn't work and it only gets information about volume and not
about the drive. Can anybody make some order in this issue for me
please?

Thanks greatly

Nov 13 '05 #2
On 3 Sep 2005 04:59:06 -0700, Gi*****@Barak-online.net wrote:
Hi,
I want to copy protect my application. I want to limit its use for a
given period of time, say 30 days, after which a license key will be
needed.

There are various issues to consider here like:

<snip>

There are methods which verge on virus technology, one of the
reasons to avoid too much shareware.
You could search Google eg on "how protect shareware"

Nov 13 '05 #3

Gi*****@Barak-online.net wrote:
Hi,
I want to copy protect my application. I want to limit its use for a
given period of time, say 30 days, after which a license key will be
needed.

There are various issues to consider here like:

1)
How to keep the installation date on the user's computer so that a
simple uninstall and a complete deletion of the application's directory
and then a re-install won't bypass the protection.

So my question here is: is there a way to locate the system folder from
code and to plant a hidden text file there? Is it a good idea or are
there pitfalls? I can then check for the existence of this file.

2)
Another issue is trying to prevent the user from copying the directory
that contains the application to another computer. If the user will
already have a password, then just copying it to another computer will
enable pirated copies.

I am looking for machine specific information. I plan on having the
application provide the user with the Computer name (by clicking a
button for example), and then asking the user to send their Computer
Name to me. I will use it to generate a code which I will then return
to the user. The user will use this code to unblock the application
after 30 days.

So my question here is: Is the Computer Name a good idea for this
purpose? Can it be changed? Can different computers have an identical
computer name? I have seen a post about retrieving information about
the hard drive serial number, but another post in the same topic said
this doesn't work and it only gets information about volume and not
about the drive. Can anybody make some order in this issue for me
please?

Thanks greatly


What I believe would be a better approach would be to have a counter
decrementing in the DB. Upon installation, set the date in a field in a
table and substract each day untill 30 days go by.

To possibly prevent the reinstallation of the DB on the same or other
computer create a form that asks the user to input their "MAC Address".
This is the physical address of their network card which is unique.
Store this in the table along with the date.

By typing "ipconfig /all" at a cmd prompt the user can get the MAC
Address, which looks as follows...

00-0D-85-8B-B2-0D

Maybe this will give you some ideas...

osmethod

Nov 13 '05 #4
"Douglas J. Steele" <NOSPAM_djsteele@NOSPAM_canada.com> wrote in
news:7p********************@rogers.com:
Computer names can be changed very easily. Simply right-click on
My Computer, select Properties from the context menu, select the
Computer Name tab and click on the Change button.
Er, only a user with administrative permission can do that. Your end
users absolutely should *not* be running with admin permission on
their workstations.
I think a far better approach is to limit how much data they can
put into the main table, rather than limit it by time.


I agree with this, but basically I don't think trying to restrict a
demo is even worth it at all, as there's absolutely no method in
Access that could never be circumvented.

--
David W. Fenton http://www.bway.net/~dfenton
dfenton at bway dot net http://www.bway.net/~dfassoc
Nov 13 '05 #5

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

79
by: Klaus Bonadt | last post by:
In order to protect software from being copied without licence, I would like to use something like a key, which fits only to the current system. The serial number of the CPU or the current...
75
by: Massimo | last post by:
I'm planning to develop a .NET application using C#, in order to sell it as a shareware and/or as a full package, so I'll need a good way to protect it against piracy. I know some ways to protect...
10
by: Jose Jimenez | last post by:
Hi Folks I wonder if somebody can help me to copy protect a C program that runs under ms-dos compilated with djgpp... and gcc I have seen www.sofpro.com for references but the software has...
2
by: Michael Howes | last post by:
I have a single DataTable in a DataSet. It has 4 columns and i'd like to get a handful of counts of unique items in 3 of the 4 columns. Can a DataTables Select or Compute methods to COUNT DISTINCT?...
19
by: John | last post by:
I would like to use some third party software for copy protection, software that prevents from copy paste program to another computer (not obfuscator). I am looking for some good solution (hardware...
20
by: Paul Bromley | last post by:
Not sure if I can ask the question in this forum - please let me know if it is better elsewhere. Does anyone know of a reasonably priced good copy protection program that will protect software on...
16
by: conrad | last post by:
What kind of problems could arise if one were to not cast the value of time() to unsigned int? What are the sections in the standard that provide the reasoning of any claims against such a...
185
by: jacob navia | last post by:
Hi We are rewriting the libc for the 64 bit version of lcc-win and we have added a new field in the FILE structure: char *FileName; fopen() will save the file name and an accessor function will...
13
by: Mr.SpOOn | last post by:
On Sun, Nov 9, 2008 at 12:29 AM, Stef Mientki <stef.mientki@gmail.comwrote: What's the problem with qt licence?
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...
0
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and...
0
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The...
0
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.