473,378 Members | 1,321 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,378 software developers and data experts.

Software protection methods.

Hi All,

1. MAC address
2. Registry
3. Serial Number Registration. ( via Server, each SN can activate 1
unit, but where to store info? encode to registry ?)
4. Checking validation when every time user is performing program.
( via Server )

However, speaking to method 1 and 2, we can change it if we want.
So, we need a good encode method.

For method 3 and 4, we need a server, and I don't like to pay this
cost.
So, my idea is to encode another code/serial number into Blog, and
then my program will auto check Blog content.

Any adivce?

Thank you very much!

I not sure it is OK or not to keep talking the security topic here. If
I should move some where else, please let me know.

Best regards,
Boki.

Jul 30 '07 #1
0 1105

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

6
by: ZaGras | last post by:
does anybody know how to make the program as a single user installation, meaning that the program only can install on one pc but can't on others pc??
9
by: Howard | last post by:
I am currently looking at the various packages that are available for software protection. I have a particular question that I'd welcome your feedback on. Background info: I work for a company...
4
by: SoftComplete Development | last post by:
Recently the company SoftComplete Development http://www.softcomplete.com launched the new revolutionary release of software code protection tool. This is large and important step in the software...
0
by: SoftComplete Development | last post by:
SoftComplete Development Updates EXECryptor to v. 2.1.20 Software piracy! Cracked serial numbers! Thousands of commercial products are posted on the warez sites and become available to all who...
7
by: dm4714 | last post by:
Hi -- does anyone know of any good VB.NET software registration, protection and activation components. I guess I'm looking for something similar to http://www.ionworx.com/solutions.html
9
by: John | last post by:
Hi, I would like to protect my software from copying. What are best tools for it (hardware protection is not an option), do you have some reccomendation for protection or third party software...
4
by: P1ayboy | last post by:
I need advice on how to best to protect software with licenses. We are developing a windows application that people can purchase and download off the net, but the software needs to be protected...
19
by: John | last post by:
I would like to use some third party software for copy protection, software that prevents from copy paste program to another computer (not obfuscator). I am looking for some good solution (hardware...
15
by: Ronald S. Cook | last post by:
If I wanted to prevent someone from purchasing my Windows software and then giving to friends, I'm wondering what the top 3 or so options are these days and pros/cons of each. I appreciate any...
6
by: Carl Dau | last post by:
I'm a software pirate and I think that ALL software is public domain, only idiots do pay for software, all software should be for free. But recently, copy-protection methods got better and...
1
by: CloudSolutions | last post by:
Introduction: For many beginners and individual users, requiring a credit card and email registration may pose a barrier when starting to use cloud servers. However, some cloud server providers now...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 3 Apr 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome former...
0
by: ryjfgjl | last post by:
In our work, we often need to import Excel data into databases (such as MySQL, SQL Server, Oracle) for data analysis and processing. Usually, we use database tools like Navicat or the Excel import...
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.