473,806 Members | 2,754 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

How do you validate a binary key / file from a Key Generator

I made a key generator according to the specs of a shareware partner so
customers can register online.

It generates a key from a 'secret' and a combination of name and email
/ zip and then encrypts with the md5 algorithm.
This shareware partner sends the key file in an email to the customer.

I'm sorry to ask this perhaps 'stupid' question but:

How do I check on my application side if the licence file / bin file is
valid?
I guess it's considering the reverse engineer risk pretty useless to
make a
function like:

Private Sub ReadLicenseFile ()
......GetBytes( "MySecret" + txtName.Text + txtEmail.Text + txtZip.Text)
and reverse the encryption.
I guess reversing isn't even possible with the one way
md5 encryption, so how do you verify you got the right key?

I don't want to include 'my secret' hard coded in my code obfuscated or
not...

My previouw application had a text key but in 2 days that key was:
'astalavista.bo x baby'...

I can use all the help I can get!

Regards,

Michael

Nov 17 '05 #1
2 1604
Hello

First of all, MD5 is not encryption algorithm you mentioned. It's a hash
function.

So, the obvious way it to request from customer "Name", "Company" and other
information and generate a key using some kind of hash algorithm or their
combination, and give the key back to user. The user will input the same
registration data and the key in your program. Your application will
calculate key using the same algorithm as you and compare these keys.

But, it is not a very big problem to create a key generator for your
application if it's written using .NET language.

Search on google. There are some commercial products for guarding you
application.


--
With best regards,
Andrew

http://www.codeproject.com/script/pr...asp?id=1181072
"Nickneem" <ni******@gmail .com> wrote in message
news:11******** *************@g 43g2000cwa.goog legroups.com...
I made a key generator according to the specs of a shareware partner so
customers can register online.

It generates a key from a 'secret' and a combination of name and email
/ zip and then encrypts with the md5 algorithm.
This shareware partner sends the key file in an email to the customer.

I'm sorry to ask this perhaps 'stupid' question but:

How do I check on my application side if the licence file / bin file is
valid?
I guess it's considering the reverse engineer risk pretty useless to
make a
function like:

Private Sub ReadLicenseFile ()
.....GetBytes(" MySecret" + txtName.Text + txtEmail.Text + txtZip.Text)
and reverse the encryption.
I guess reversing isn't even possible with the one way
md5 encryption, so how do you verify you got the right key?

I don't want to include 'my secret' hard coded in my code obfuscated or
not...

My previouw application had a text key but in 2 days that key was:
'astalavista.bo x baby'...

I can use all the help I can get!

Regards,

Michael

Nov 17 '05 #2
Thanks Andrew,

Works like a charm now!
Thanks for you assistance

Michael

Nov 17 '05 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

1
1949
by: fishboy | last post by:
Howdy, I'm in middle of a personal project. Eventually it will download multipart binary attachments and look for missing parts on other servers. And so far I've got it to walk a newsgroup and download and decode single part binaries. I thought I'd post the code and see what people think. I'd appreciate any feedback. It's my first program with generators and I'm worried I'm making this twice and hard as it needs to be.
0
1870
by: fishboy | last post by:
Howdy, Sorry if this is a double post. First try seemed to go into hyperspace. I'm working on a personal project. It's going to be a multipart binary attachment downloader that will search alternate servers for missing pieces. This is the working code so far. It will walk a newsgroup and download and decode all the single part attachments. Just change server,user,password,group at the bottom to something less
17
10539
by: Guyon Morée | last post by:
what is the difference? if I open a text file in binary (rb) mode, it doesn't matter... the read() output is the same.
13
15273
by: yaipa | last post by:
What would be the common sense way of finding a binary pattern in a ..bin file, say some 200 bytes, and replacing it with an updated pattern of the same length at the same offset? Also, the pattern can occur on any byte boundary in the file, so chunking through the code at 16 bytes a frame maybe a problem. The file itself isn't so large, maybe 32 kbytes is all and the need for speed is not so great, but the need for accuracy in the...
12
16115
by: neutrino | last post by:
Greetings to the Python gurus, I have a binary file and wish to see the "raw" content of it. So I open it in binary mode, and read one byte at a time to a variable, which will be of the string type. Now the problem is how to print the binary format of that charater to the standard output. It seems a common task but I just cannot find the appropriate method from the documentation. Thanks a lot.
3
1309
by: Nickneem | last post by:
I made a key generator according to the specs of a shareware partner so customers can register online. It generates a key from a 'secret' and a combination of name and email / zip and then encrypts with the md5 algorithm. This shareware partner sends the key file in an email to the customer. I'm sorry to ask this perhaps 'stupid' question but: How do I check on my application side if the licence file / bin file is
1
2483
by: kristian.hermansen | last post by:
keherman@ibmlnx20:/tmp$ cat helloworld.py #!/usr/bin/env python import pygtk pygtk.require('2.0')
1
1653
by: john.swilting | last post by:
I am not good in Javascript I begin I do not understand why my function does not go I post my code <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head> <title>contact.html</title> <meta name="generator" content="Bluefish 1.0.7"> <meta name="author" content="swilting">
1
3616
by: yohan610 | last post by:
i have to read the binary data of a file, then encrypt them according to a supplied algorithm...and then the obtained output has to be written to an output file...everything works ok, and there are no errors... but when i print out the binary data from the input file it seems to be the same whtever the file, and then after encrypting and wirting the data to the output file, the output file has a size of 0KB and nothing in it..pls help as soon...
0
9719
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
10624
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
10111
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
1
7650
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
6877
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
5546
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
0
5684
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
1
4330
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
2
3853
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.