473,702 Members | 2,670 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Processor ID

Hi
I need to protect my application in a way. Just a "soft" protection,
not a very strong one.
So, using WMI I get the processor ID and compare it against a key.
Protection works well, until someone (me) decides to clone the system.
After cloning, all cloned systems work with the same key. That is, WMI
returns the same processor id on all workstations.
It seems that Windows "caches" the processor ID in the registry or
somewhere else - I didn't dig it - so that subsequent calls to WMI
returns the result from that location.
It's the only logical answer I could give.

My questions:
- is there a way to get a "phisical" processor ID? If yes, how?
- do you use a different kind of simple protection? If yes, which one?

Thanks.

Feb 5 '07 #1
5 6587
On 5 Feb, 13:35, "nano2k" <adrian.rot...@ ikonsoft.rowrot e:
Hi
I need to protect my application in a way. Just a "soft" protection,
not a very strong one.
So, using WMI I get the processor ID and compare it against a key.
Protection works well, until someone (me) decides to clone the system.
After cloning, all cloned systems work with the same key. That is, WMI
returns the same processor id on all workstations.
It seems that Windows "caches" the processor ID in the registry or
somewhere else - I didn't dig it - so that subsequent calls to WMI
returns the result from that location.
It's the only logical answer I could give.

My questions:
- is there a way to get a "phisical" processor ID? If yes, how?
- do you use a different kind of simple protection? If yes, which one?

Thanks.
HD serial imo rather than processor. And make sure there's a painless
way to reinstall it if say the HD needs replacing or the PC is
replaced, I'd say a 30 day grace period or similar to reactivate.
Linky below.

http://www.eggheadcafe.com/articles/20030511.asp
Feb 5 '07 #2
Why should I use HDD serial?
The hard disk is the first (maybe second, after memory) thing that is
subject of replacement (damage / upgrade, etc).
The processor is the piece that virtually never changes inside a
system.
Thanks for the link. I already implemented that idea, long ago, and
THAT idea is WRONG. I already explaned what happens when cloning
systems. Both the original system and the cloned system return the
same process id, which is incorrect.
Let's assume you buy an application from me. My app is protected using
the processor id retrieved through WMI.
You buy one license. I install the license to your computer. After
that, you are free to clone your hdd and restore it to as-many-systems-
you-want. And here we are! You payed 1 license, you got N licenses
without the need to ask me extra lincese keys.

Thanks again.
DeveloperX a scris:
On 5 Feb, 13:35, "nano2k" <adrian.rot...@ ikonsoft.rowrot e:
Hi
I need to protect my application in a way. Just a "soft" protection,
not a very strong one.
So, using WMI I get the processor ID and compare it against a key.
Protection works well, until someone (me) decides to clone the system.
After cloning, all cloned systems work with the same key. That is, WMI
returns the same processor id on all workstations.
It seems that Windows "caches" the processor ID in the registry or
somewhere else - I didn't dig it - so that subsequent calls to WMI
returns the result from that location.
It's the only logical answer I could give.

My questions:
- is there a way to get a "phisical" processor ID? If yes, how?
- do you use a different kind of simple protection? If yes, which one?

Thanks.

HD serial imo rather than processor. And make sure there's a painless
way to reinstall it if say the HD needs replacing or the PC is
replaced, I'd say a 30 day grace period or similar to reactivate.
Linky below.

http://www.eggheadcafe.com/articles/20030511.asp
Feb 5 '07 #3
On 5 Feb, 15:03, "nano2k" <adrian.rot...@ ikonsoft.rowrot e:
Why should I use HDD serial?
The hard disk is the first (maybe second, after memory) thing that is
subject of replacement (damage / upgrade, etc).
The processor is the piece that virtually never changes inside a
system.
Thanks for the link. I already implemented that idea, long ago, and
THAT idea is WRONG. I already explaned what happens when cloning
systems. Both the original system and the cloned system return the
same process id, which is incorrect.
Let's assume you buy an application from me. My app is protected using
the processor id retrieved through WMI.
You buy one license. I install the license to your computer. After
that, you are free to clone your hdd and restore it to as-many-systems-
you-want. And here we are! You payed 1 license, you got N licenses
without the need to ask me extra lincese keys.

Thanks again.

DeveloperX a scris:
On 5 Feb, 13:35, "nano2k" <adrian.rot...@ ikonsoft.rowrot e:
Hi
I need to protect my application in a way. Just a "soft" protection,
not a very strong one.
So, using WMI I get the processor ID and compare it against a key.
Protection works well, until someone (me) decides to clone the system.
After cloning, all cloned systems work with the same key. That is, WMI
returns the same processor id on all workstations.
It seems that Windows "caches" the processor ID in the registry or
somewhere else - I didn't dig it - so that subsequent calls to WMI
returns the result from that location.
It's the only logical answer I could give.
My questions:
- is there a way to get a "phisical" processor ID? If yes, how?
- do you use a different kind of simple protection? If yes, which one?
Thanks.
HD serial imo rather than processor. And make sure there's a painless
way to reinstall it if say the HD needs replacing or the PC is
replaced, I'd say a 30 day grace period or similar to reactivate.
Linky below.
http://www.eggheadcafe.com/articles/20030511.asp- Hide quoted text -

- Show quoted text -
Yeah that's the point. With VMWare at least you can't change the HD
Serial number (You can change the volume ID, but that's different). Of
course there's nothing to stop them installing it onto the vmware
image after, but I think it has a specific serial so you could always
just check for that and refuse to install.
Saying all that people like virtualisation so preventing them from
installing your product in a vmware environment will probably lose you
some friends/sales and alot of licenses are far more virtualisation
friendly now.

It's a tricky nut to crack, look at the efforts MS have put into
preventing their software from being pilfered.
Feb 5 '07 #4
Hi,

"nano2k" <ad***********@ ikonsoft.rowrot e in message
news:11******** **************@ a34g2000cwb.goo glegroups.com.. .
| Hi
| I need to protect my application in a way. Just a "soft" protection,
| not a very strong one.
| So, using WMI I get the processor ID and compare it against a key.
| Protection works well, until someone (me) decides to clone the system.
| After cloning, all cloned systems work with the same key. That is, WMI
| returns the same processor id on all workstations.
| It seems that Windows "caches" the processor ID in the registry or
| somewhere else - I didn't dig it - so that subsequent calls to WMI
| returns the result from that location.
| It's the only logical answer I could give.
|
| My questions:
| - is there a way to get a "phisical" processor ID? If yes, how?
| - do you use a different kind of simple protection? If yes, which one?
I think this question will be better answered in a WMI NG. Personally I
would find it very weird that the processor ID is cached. and transported to
the others system.
--
Ignacio Machin
machin AT laceupsolutions com
Feb 5 '07 #5
Personally, I've developed software protecting mechanisms in the past and I
what I have done is to compile a set of data from different pieces of the
hardware, as:

a) BIOS information - there is a piece of ROM, which is available for PEEK,
which does not change.
b) Hardware information - there is a set of data on the ROM which can also
be used for that purpose. Normally starts on the segment F000
c) CPU data (speed, etc)
d) HD information, normally serial info
e) video card information: normally starts at segment C000 or C800,
depending on the card type

Besides, today Windows protection mechanisms are groing. You could use data
from the registry for that.

You can compile a set of bulk data and compare against the same data you
would gather from the machine

I hope it helps.

--
Regards,
Robson Siqueira
Enterprise Architect
"nano2k" <ad***********@ ikonsoft.rowrot e in message
news:11******** **************@ a34g2000cwb.goo glegroups.com.. .
Hi
I need to protect my application in a way. Just a "soft" protection,
not a very strong one.
So, using WMI I get the processor ID and compare it against a key.
Protection works well, until someone (me) decides to clone the system.
After cloning, all cloned systems work with the same key. That is, WMI
returns the same processor id on all workstations.
It seems that Windows "caches" the processor ID in the registry or
somewhere else - I didn't dig it - so that subsequent calls to WMI
returns the result from that location.
It's the only logical answer I could give.

My questions:
- is there a way to get a "phisical" processor ID? If yes, how?
- do you use a different kind of simple protection? If yes, which one?

Thanks.

Feb 5 '07 #6

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

1
1592
by: Ola Natvig | last post by:
Hi all I'm working with a long running, threaded server which serves HTTP requests with content which are passed through a XSLT processor. The XSLT processor I'm using is the Pyana processor. I have one compiled stylesheet which I uses to process all responses. This way I only need to read and compile the stylesheet once. When serving a rather small page 404-page I get the server to process
3
3145
by: Amit Dedhia | last post by:
Hi I am developing a Dot net application (involving image processing) on a uni processor. It works well on my machine. I then take all my code on a multi processor, build and run the application there. There is performance degradation. The usual performance of the application on MP machine is better than that of uni processor machine. But the performance of MP degrades when it comes to the multi-threaded part of the application. I am...
5
5231
by: dba_db2 at nospam gmx.net | last post by:
We have got a brand new mutltiprocessor machine IBM pseries server with 2 processors. Now we want to buy a IBM DB2 license for this box. Does anyone know whether it is possible to buy a single processor db2 license for this machine and to configure the db2 software with db2licm just to use one processor.
1
4918
by: Jeff Mitchell | last post by:
I have a logging application that records various performance metrics into a database every 5 minutes, and to this I'd like to add a performace counter that shows the processor usage in a manner akin to what you see in the Performance tab of the Task Manager -- whatever that value is when the timer fires is what I want to record I'm using System.Diagnostics.PerformanceCounter with the "% Processor Time" counter, but I'm having a problem. The...
4
7016
by: kaiteriteri | last post by:
I have a time-consuming VB.net application that i'd like to thread over 2 processors (that's all i've got in my machine!) and, hopefully, get it done in half the time. On running, the application should create a 2nd thread and run it on the other processor (processing a distinct set of data), leaving the current thread to run and process its set of data. But the 2nd thread must run on the free processor, otherwise there's no point... ...
3
1434
by: Michel Meex | last post by:
Hello, I have an application, that has been running on a single processor server for more then a year without any problems. Now I'm migrating to a dual processor server, and I'm experiencing problems with threading. The application is actually a kind of job schedular. For all jobs, I can set a recurring interval (daily,weekly, monthly etc) at which the specific job should be started. We program each job, according to an interface....
1
1399
by: Michel Meex | last post by:
Hello, I have an application, that has been running on a single processor server for more then a year without any problems. Now I'm migrating to a dual processor server, and I'm experiencing problems with threading. The application is actually a kind of job schedular. For all jobs, I can set a recurring interval (daily,weekly, monthly etc) at which the specific job should be started. We program each job, according to an interface....
11
2314
by: sunil | last post by:
Dear All, I have created a .Net service in 2.0 and running it on a machine that has a Quad Processor. It is failing with the following error. "Error 1053: The service did not respond to the start or control request in a timely fashion" This is what I saw in event Viewer. Timeout (30000 milliseconds) waiting for the MyService Server service to connect.
168
7236
by: broeisi | last post by:
Hello, Is there a way in C to get information at runtime if a processor is 32 or 64 bit? Cheers, Broeisi
0
9234
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
1
8979
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
8939
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
7829
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
6575
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
5907
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
4412
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
2
2399
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
3
2036
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.