473,657 Members | 2,427 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

How to make sure that Application built is COPY/Piracy Proof

Hi,
I would be installing a desktop application on a standalone PC.
How do I make sure that owner should not be ableto copy that and/or
give it to other folks.
In short, how to build measures to avoid piracy?

User ID/Password is one of the ways. But that can anyway be shared.

Thansk for your inputs.
Regards,
Pioneer.
Oct 31 '08 #1
12 2316
hi,

Pioneer wrote:
I would be installing a desktop application on a standalone PC.
How do I make sure that owner should not be ableto copy that and/or
give it to other folks.
This is not possible.
mfG
--stefan <--
Oct 31 '08 #2
On Oct 31, 1:47*pm, Stefan Hoffmann <ste...@ste5an. dewrote:
hi,

Pioneer wrote:
I would be installing a desktop application on a standalone PC.
How do I make sure that owner should not be ableto copy that and/or
give it to other folks.

This is not possible.

mfG
--stefan <--
I was thinking on the lines of

-Generating an IP address for that PC and hardcoding that in the
application as a pre condition to run the code.
-Or may be linking the run of application to existance of any file
which would exist in that machine. This ofcourse would be unknown to
owner.
would it be possible?
Oct 31 '08 #3
hi,

Pioneer wrote:
-Generating an IP address for that PC and hardcoding that in the
application as a pre condition to run the code.
-Or may be linking the run of application to existance of any file
which would exist in that machine. This ofcourse would be unknown to
owner.
would it be possible?
This is possible, but you can still copy your application and distribute
it...
mfG
--stefan <--
Oct 31 '08 #4
"Pioneer" <ad******@gmail .comwrote in message
news:95******** *************** ***********@g17 g2000prg.google groups.com...
-Generating an IP address for that PC and hardcoding that in the
application as a pre condition to run the code.
What exactly do you mean by "generating " an IP address? PCs either have a
fixed IP address, or they acquire one from a DHCP server. Fixed IP addresses
can be changed through configuration, and an IP address acquired from a DCHP
server might be different every time...
-Or may be linking the run of application to existance of any file
which would exist in that machine. This ofcourse would be unknown to
owner.
And what if the owner accidentally deleted that file? Your app would stop
working... Or what if they got a new PC - that file wouldn't be on it, so
your app wouldn't work...
--
Mark Rae
ASP.NET MVP
http://www.markrae.net

Oct 31 '08 #5
On Oct 31, 2:52*pm, "Mark Rae [MVP]" <m...@markNOSPA Mrae.netwrote:
"Pioneer" <adiid...@gmail .comwrote in message

news:95******** *************** ***********@g17 g2000prg.google groups.com...
-Generating an IP address for that PC and hardcoding that in the
application as a pre condition to run the code.

What exactly do you mean by "generating " an IP address? PCs either have a
fixed IP address, or they acquire one from a DHCP server. Fixed IP addresses
can be changed through configuration, and an IP address acquired from a DCHP
server might be different every time...
-Or may be linking the run of application to existance of any file
which would exist in that machine. This ofcourse would be unknown to
owner.

And what if the owner accidentally deleted that file? Your app would stop
working... Or what if they got a new PC - that file wouldn't be on it, so
your app wouldn't work...

--
Mark Rae
ASP.NET MVPhttp://www.markrae.net
Hmm. Your points are valid. But the customer I am looking at is not
that pro in computers. And I am desparate to avoid piracy of my
application. Anyways, can I get a code snippet for IP check? Or how to
get IP of machine through code?
Oct 31 '08 #6
hi,

Pioneer wrote:
Hmm. Your points are valid. But the customer I am looking at is not
that pro in computers. And I am desparate to avoid piracy of my
application. Anyways, can I get a code snippet for IP check? Or how to
get IP of machine through code?
Take the user SID and use a public-key encryption. Store the signed SID
in the registry.
mfG
--stefan <--
Oct 31 '08 #7
On Fri, 31 Oct 2008 03:10:08 -0700, Pioneer <ad******@gmail .comwrote:
Hmm. Your points are valid. But the customer I am looking at is not
that pro in computers. And I am desparate to avoid piracy of my
application.
There are any number of strategies you can try to use to prevent copying
of your program.

But. As Stefan has already pointed out to you, making an application
"piracy proof" is not possible. If you deliver the code to a customer,
there will _always_ be the theoretical possibility of them copying it.
Whether a specific customer has the technical know-how to do that, is a
separate question. But it's not possible to guarantee that software
delivered to a customer can't be copied.

It's hard for me to imagine someone who is literally "desperate to avoid
piracy" of their software. What makes you so desperate? Do you have a
loved family member being held hostage, and the only way to get them back
is to keep your program from being pirated? Or maybe there's a bus
somewhere that has a bomb on it, and if your software is pirated, the bomb
will be armed and the bus's cruise control locked at 50 mph?

The fact is, if your market is so small that you have a _specific_
customer in mind who you suspect would copy your software, what you've got
is a people problem, not a software problem. That's a market so small
that if someone is using your software in an unauthorized manner, it
should be easy enough for you to know simply because they aren't buying a
license you know they should be buying. And you should deal with a
situation like that by asserting your legal rights, rather than wasting
time on copy protection that may not be effective.

Keep in mind also that copy protection that has the possibility of a
failure mode in which it incorrectly detects the software as being pirated
will generally _lead_ to illegal copying that otherwise would not have
occurred. Customers really don't like it when they pay good money for a
product only to have that product refuse to work, and they start figuring
out that a hacked version without the copy protection (i.e. a pirated
version) is a better deal. Even in a small market where a hacked version
is less likely to be created, it can easily lead to lost sales. And if
you have only one customer, that can be _really_ bad for business.

These are just a handful of the strong arguments against wasting time on
copy protection.

You need to ask yourself: "what is it about my business model that would
lead my customer to pirate my software". Then address _that_. Trying to
lock down the software itself is full of heartbreak and misery, and can
only lead to disappointment.

Pete
Oct 31 '08 #8
"Pioneer" <ad******@gmail .comwrote in message
news:8a******** *************** ***********@s1g 2000prg.googleg roups.com...
And I am desparate to avoid piracy of my application.
Then I'm afraid to say that you're not living in the real world. Avoiding
software piracy is impossible...
Anyways, can I get a code snippet for IP check? Or how to
get IP of machine through code?
http://aspnet.4guysfromrolla.com/articles/071807-1.aspx

It's important that you understand that this won't help you at all in
preventing software piracy...
--
Mark Rae
ASP.NET MVP
http://www.markrae.net

Oct 31 '08 #9
"Pioneer" <ad******@gmail .comwrote in message
news:8a******** *************** ***********@s1g 2000prg.googleg roups.com...
Anyways, can I get a code snippet for IP check? Or how to
get IP of machine through code?
http://www.google.co.uk/search?sourc...+local+machine
--
Mark Rae
ASP.NET MVP
http://www.markrae.net

Oct 31 '08 #10

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

79
14059
by: Klaus Bonadt | last post by:
In order to protect software from being copied without licence, I would like to use something like a key, which fits only to the current system. The serial number of the CPU or the current operating system would be appropriate. However, I do not know how to retrieve the information. Could you help? Klaus
75
8246
by: Massimo | last post by:
I'm planning to develop a .NET application using C#, in order to sell it as a shareware and/or as a full package, so I'll need a good way to protect it against piracy. I know some ways to protect it (activation, serial keys, etc.), but my concern is: how can any copy protection mechanism work when you can always disassemble it and read the source code? Even if I use a native C++ DLL for my copy protection, the point where it's called from...
0
2020
by: SoftComplete Development | last post by:
SoftComplete Development Updates EXECryptor to v. 2.1.20 Software piracy! Cracked serial numbers! Thousands of commercial products are posted on the warez sites and become available to all who want have your software product and pay no money for your development work! Shareware developpers look for good protection for their products and create some protection themselves or find ready-made tools. But there's no many programs really...
71
10723
by: active | last post by:
In the main program I check to see if a certain form has been disposed. Does it make sense in that form's FormClosed event to do: Me.Dispose to make sure it is disposed the next time I check. Or is that automatic? Thanks
2
2031
by: Nilesh wadhwani | last post by:
hello friends , Myself Nilesh wadhwani ,LNMIIT colllege, jaipur .I built an software which stop piracy n i want to update documentation which tells about how it works n what r advantages n what r disadvantages compairing to other products of market .So i want to know is there any proper format to do this if yes then pls send it to me and if no then tell me according to you in what format should i write?
12
1888
by: =?Utf-8?B?S2plbGw=?= | last post by:
Hello I've taken a four days training in C#, very good training, experienced teacher and all that, very positive. Went home spent a week making my first application, slightly more than the usual "Hello world". Took it with me to my best customer, and beleive it or not....It will not work !!!!
0
8829
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
8734
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
1
8508
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
8608
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
7341
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
6172
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
4164
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
1
2733
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
2
1962
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.