473,399 Members | 3,832 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,399 software developers and data experts.

Restrict the users to use the DLL

Hell All
I create a DLL in C#.Net.It is used in my application but i want to restirct all other user to use my DLL. What should i do for this.

Thanks & Regards
Ramveer Singh
Nov 20 '07 #1
4 1563
Shashi Sadasivan
1,435 Expert 1GB
Hell All
I create a DLL in C#.Net.It is used in my application but i want to restirct all other user to use my DLL. What should i do for this.

Thanks & Regards
Ramveer Singh
Who are your users?
1. The people who use the application?
or
2. the people who program the application?
Nov 20 '07 #2
Plater
7,872 Expert 4TB
I think the OP means they want only the programs THEY create to have access to this DLL and that other people trying to use the code stored in the DLL cannot.

Actually I'm a bit curious about this as well.
Nov 20 '07 #3
Shashi Sadasivan
1,435 Expert 1GB
Oh ok...
get the picture.

What if the dll responds only to those requests which have been authenticated?

As in, its got its own authentication mechanism whenever an object is created contained in it. If the authentication fails exceptions are thrown which makes the objects unusable.

However...the drawbacks:
You will have to code an algorithm into the DLL. (which can be cracked)
Your code will contain the authentication coe being sent to the DLL Each time, i dont know if this can be trracked if its on release mode.
Nov 20 '07 #4
Thank You Very Much for Reply Sir


Oh ok...
get the picture.

What if the dll responds only to those requests which have been authenticated?

As in, its got its own authentication mechanism whenever an object is created contained in it. If the authentication fails exceptions are thrown which makes the objects unusable.

However...the drawbacks:
You will have to code an algorithm into the DLL. (which can be cracked)
Your code will contain the authentication coe being sent to the DLL Each time, i dont know if this can be trracked if its on release mode.
Nov 22 '07 #5

Sign in to post your reply or Sign up for a free account.

Similar topics

2
by: Gerry | last post by:
I have a developer here with a website running with only "Windows Integrated Authentication" set on a Windows 2000 member server that uses GetObject to get a user's group membership in the domain....
3
by: Paul | last post by:
Hi all, at present I I've built a website which can be updated by admin and users. My problem, I've combined "log in" and "access levels" to restrict access to certain pages, using the built...
2
by: Sudheer | last post by:
Hi All, We need to restrict multiple users login to the system. If one user is online with one userID, we need to show the message "This user already logs in to the system" to the other user who...
1
by: Dave | last post by:
We have an intranet application that is under Integrated security. So in theory, anyone who has an Active Directory account in the company can access my app. So, to allow only certain users, I...
2
by: pemo | last post by:
In Harbison and Steele's book, they say that using 'restrict' allows functions like memcpy() to be prototyped like this: void * memcpy(void * restrict s1, const void * restrict s2, size_t n); ...
21
by: Niu Xiao | last post by:
I see a lot of use in function declarations, such as size_t fread(void* restrict ptr, size_t size, size_t nobj, FILE* restrict fp); but what does the keyword 'restrict' mean? there is no...
3
by: dion.naidoo | last post by:
Hi ,is there any way one can restrict users to copy files with extensions that we dont want on our networks or local pcs. Users are local administrators of their pcs. PS. If this is not possible...
2
by: sushilviews | last post by:
Hi, I want restrict users from using the backward navigation buttons or backspace key in IE or may be in any browser. What is the the best way of not allowing the user to restrict backward...
5
by: Dakrat | last post by:
Allow me to preface this post by saying that this is my first database project, and while I have learned a lot, any concepts I have learned are hit and miss as I have found new requirements and...
5
by: need2know | last post by:
Hello In my quest for knowlwdge i would like to know if it possible to hide or restrict certain folders on the C drive from other users who log and use the same computer as the administrator...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.