473,657 Members | 2,492 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Web activation

Hi all, hope someone can help point me in the right direction, or maybe just
have a chat about the following.

Being a bespoke developer I have played about with piracy problems in the
past.

In most cases where systems are small and very specific there has been
little point in protecting the installed application/s. They just wouldn't
work for another other customer.

Where Host protection has been a nesessity I have used a hardware key. I'm
not apposed to this approach except I may need to hold a large stock of
them, I don't really want to do this.

I now have a couple of applications that I want to distribute in large
numbers, this means the systems are very generic and many, meny customers
could benefit, obviously I want to protect the licensing.

This is a two stage problem, I need to be able to protect Host and Portable
(PPC2003 / CE.NET) applications.

Where Portable protection has been required in the past, I've always managed
to get some 'unique' information from the portable and store it (one way
encrypted) in a host database. I've had real difficulties getting anything
unique from any portable running the CF.

Basically, I'm looking for the Holy Grail of software installations, a multi
printed CD or web download, that is unique when it hits a customer PC.

I can do all the FTP or other web comms required for the software to connect
to a site, check data, download a serial number, blah, blah, blah....

Microsoft seem to be happy with the fact that you have installed XP once on
a single PC, this is registered over the web, and works fine. Until, you
have to format a PC, sometimes your original code works, sometimes it
doesn't. When it doesn't you call MS and tell them you need a new key, and
they give you one. How does this protect them from piracy? It could be a
completely different PC! Working for another company, (Not My Own) I have
seen this done to get around a small office license.

I suppose what I'm really interested in, is what information I can gather
from a PC as a unique 'installation key'.

I've thought of Hard Drive volume number, but this changes after a format.
Video card information, but this may be changed at any time.
Main Chip, it's possible this may change, more like break!
Main Board Serial, this sounds the best, but I've had to change board from
time to time.

I could look at a mixture of Domain, Server Name, Main Board, etc, etc, but
I still can't get around the fact that a customer may 'claim' to have had a
break down.

Now to the real point of all of this!

Can anyone out there inform me of the legality of collecting information
from a PC where my software is installed?

If I were to collect by 'FTP' or 'Other means', the Domain, PC Name, Server
Name, etc, when my application was started I could immediately be allerted
to my software running on an un-approved PC.

Obviously there would be no individuals information, or company specific
information being passed to me. Is this a legitimate data transfer?

I have to say at this point I really don't want to use any 3rd party
software or hardware to protect installation sets or code. I can protect
code already, and don't want the hassle of adding others applciations to
ours.

????

Cheers,
Tull.
Jan 25 '06 #1
6 1306
Tull,

You have mention a lot. Take an analogy

Why can the not make something to prevent stealing cars.

Every system will probably fail. The more ingenious it is, the more high is
the challenge for others, for which this is a kind of sport, to break it.

Try to get that what is in your situation the most optimal and don't overdo
it, you will than probably see that at last you are the one who has a
perfect system to prevent that your software will not be stolen. It will not
be used.

Just my thought,

Cor
Jan 25 '06 #2
"Tull Clancey" <tu**********@b topenworld.com> wrote in message
news:dr******** **@nwrdmz01.dmz .ncs.ea.ibs-infra.bt.com...
Hi all, hope someone can help point me in the right direction, or maybe
just have a chat about the following.


Adding to Cor's reply, if you "fingerprin t" an app so it won't run on
another PC or the protection would break if the end user changes hardware,
be prepared for a flood of support calls. I change hardware so often that
something like this would drive me nuts. In MSs case, what they seem to be
doing is, eliminating the "casual" pirate. You know... the ones that say
"Hey! I just got a copy of XYZ.. Do you want me to burn one for you too?" By
placing that extra "fear factor" in a casual pirates head, they just won't
copy as often as they would otherwise.

Hardware keys are also a pain. Especially for developers like me that tend
to take work home. If I had to crawl under my desk and unplug a dongle, take
it home, crawl under the desk there, install it and possibly deal with
"Missing Hardware" dialogs on either end, I don't think I'd do homework at
all <g> Besides, anyone capable of cracking software licensing can do a
little more research and find a way to bypass a dongle.

There's a "fine line" that says "do I spend a whole bunch of time on my
protection scheme? or do I spend that time improving my product."

If you're going to be charging a pile of money for your apps and/or predict
that you'll be selling copies in a "1000's per year" purchasing environment,
you might want to consider using InstallShield's Activation Service. It's
priced well out of my range but, if I had anything valuable enough to
protect with that much security, I'd do it.

I'm not sure of their 'hand held device' support but I assume that, since
they support creating setup packages for these kind of devices, they also
support the protection of the software installed on these devices. arghhhh
their entire site changed so all of my links are broken... here's a start.

Protecting Software
http://www.macrovision.com/solutions...ng/index.shtml

--
Ken Halter - MS-MVP-VB (visiting from VB6 world) - http://www.vbsight.com
Please keep all discussions in the groups..
Jan 25 '06 #3
Thanks for your time, I appreciate your comments.
Cheers,
Tull.

"Cor Ligthert [MVP]" <no************ @planet.nl> wrote in message
news:Ol******** ******@TK2MSFTN GP15.phx.gbl...
Tull,

You have mention a lot. Take an analogy

Why can the not make something to prevent stealing cars.

Every system will probably fail. The more ingenious it is, the more high
is the challenge for others, for which this is a kind of sport, to break
it.

Try to get that what is in your situation the most optimal and don't
overdo it, you will than probably see that at last you are the one who has
a perfect system to prevent that your software will not be stolen. It will
not be used.

Just my thought,

Cor

Jan 26 '06 #4
Thanks for your time on this, the support side of things is something I want
to avoid at all costs, I've been in support for large companies before, and
don't want to go back!!

The apps I'm thinking of aren't huge and aren't going to sell for a great
deal of money, this is why i don't want to use any 3rd party tools, software
or hardware.

To be honest if I sold a single license to a company who then install the
software on several PC's, I'm not that bothered, what I want to avoid is
that solftware being passed to other companies.

At present I'm just wondering about the legality of collecting very simple
network information from a Host PC.

Maybe I'm thinking too much on this!

Anyway, all your comments are greatfully recevied.
Cheers,
Tull.

"Ken Halter" <Ken_Halter@Use _Sparingly_Hotm ail.com> wrote in message
news:eh******** ********@TK2MSF TNGP11.phx.gbl. ..
"Tull Clancey" <tu**********@b topenworld.com> wrote in message
news:dr******** **@nwrdmz01.dmz .ncs.ea.ibs-infra.bt.com...
Hi all, hope someone can help point me in the right direction, or maybe
just have a chat about the following.


Adding to Cor's reply, if you "fingerprin t" an app so it won't run on
another PC or the protection would break if the end user changes hardware,
be prepared for a flood of support calls. I change hardware so often that
something like this would drive me nuts. In MSs case, what they seem to be
doing is, eliminating the "casual" pirate. You know... the ones that say
"Hey! I just got a copy of XYZ.. Do you want me to burn one for you too?"
By placing that extra "fear factor" in a casual pirates head, they just
won't copy as often as they would otherwise.

Hardware keys are also a pain. Especially for developers like me that tend
to take work home. If I had to crawl under my desk and unplug a dongle,
take it home, crawl under the desk there, install it and possibly deal
with "Missing Hardware" dialogs on either end, I don't think I'd do
homework at all <g> Besides, anyone capable of cracking software licensing
can do a little more research and find a way to bypass a dongle.

There's a "fine line" that says "do I spend a whole bunch of time on my
protection scheme? or do I spend that time improving my product."

If you're going to be charging a pile of money for your apps and/or
predict that you'll be selling copies in a "1000's per year" purchasing
environment, you might want to consider using InstallShield's Activation
Service. It's priced well out of my range but, if I had anything valuable
enough to protect with that much security, I'd do it.

I'm not sure of their 'hand held device' support but I assume that, since
they support creating setup packages for these kind of devices, they also
support the protection of the software installed on these devices. arghhhh
their entire site changed so all of my links are broken... here's a start.

Protecting Software
http://www.macrovision.com/solutions...ng/index.shtml

--
Ken Halter - MS-MVP-VB (visiting from VB6 world) - http://www.vbsight.com
Please keep all discussions in the groups..

Jan 26 '06 #5
Tull,

The most simple way if you are selling them in low numbers is in my opinion
to set yourself the companyname who buys it from you in top of the screen,
can be something "Yourcompanynam e/productname this software is licenced to
XXXX" just in the text property of the form.

That you can do than from an encrypted config.sys. (You create a programn
for yourself for that).

There are not much who want to have the name of another company in their
screen, showing that they are using illegal software.

This is of course easy to decrypt, and it is not real protecting, however it
helps probably a lot in the situation as you describe.

Just as idea.

:-)

Cor
Jan 26 '06 #6
Hi Tull

We provide a very low cost ($US80) public key encrypted based
licensing solution that ensures that crackers can't generate legitimate
license keys by simply inspecting your downloadable evaluation code.
You can get more info and download an evaluation version at:

www.infralution.com/licensing.html

Even if you aren't interested in a commercial product you might want to
visit our website just to see some arguments for avoiding web
activation solutions. There is also a really good article on
CodeProject
(http://www.codeproject.com/gen/desig...tialWisdom.asp) about
the balance between protecting your software and annoying your
customers.

The reality is that just about any licensing and code protection scheme
can be bypassed. If you look at the crack sites you will find cracks
for all of the licensing and protection products. If the security
experts can't prevent their own products being cracked what hope do you
have. What you need is a scheme that prevents casual license abuse
without driving your legitimate customers nuts.

Regards
Grant Frisken
Infralution
Tull Clancey wrote:
Thanks for your time on this, the support side of things is something I want
to avoid at all costs, I've been in support for large companies before, and
don't want to go back!!

The apps I'm thinking of aren't huge and aren't going to sell for a great
deal of money, this is why i don't want to use any 3rd party tools, software
or hardware.

To be honest if I sold a single license to a company who then install the
software on several PC's, I'm not that bothered, what I want to avoid is
that solftware being passed to other companies.

At present I'm just wondering about the legality of collecting very simple
network information from a Host PC.

Maybe I'm thinking too much on this!

Anyway, all your comments are greatfully recevied.
Cheers,
Tull.

"Ken Halter" <Ken_Halter@Use _Sparingly_Hotm ail.com> wrote in message
news:eh******** ********@TK2MSF TNGP11.phx.gbl. ..
"Tull Clancey" <tu**********@b topenworld.com> wrote in message
news:dr******** **@nwrdmz01.dmz .ncs.ea.ibs-infra.bt.com...
Hi all, hope someone can help point me in the right direction, or maybe
just have a chat about the following.


Adding to Cor's reply, if you "fingerprin t" an app so it won't run on
another PC or the protection would break if the end user changes hardware,
be prepared for a flood of support calls. I change hardware so often that
something like this would drive me nuts. In MSs case, what they seem to be
doing is, eliminating the "casual" pirate. You know... the ones that say
"Hey! I just got a copy of XYZ.. Do you want me to burn one for you too?"
By placing that extra "fear factor" in a casual pirates head, they just
won't copy as often as they would otherwise.

Hardware keys are also a pain. Especially for developers like me that tend
to take work home. If I had to crawl under my desk and unplug a dongle,
take it home, crawl under the desk there, install it and possibly deal
with "Missing Hardware" dialogs on either end, I don't think I'd do
homework at all <g> Besides, anyone capable of cracking software licensing
can do a little more research and find a way to bypass a dongle.

There's a "fine line" that says "do I spend a whole bunch of time on my
protection scheme? or do I spend that time improving my product."

If you're going to be charging a pile of money for your apps and/or
predict that you'll be selling copies in a "1000's per year" purchasing
environment, you might want to consider using InstallShield's Activation
Service. It's priced well out of my range but, if I had anything valuable
enough to protect with that much security, I'd do it.

I'm not sure of their 'hand held device' support but I assume that, since
they support creating setup packages for these kind of devices, they also
support the protection of the software installed on these devices. arghhhh
their entire site changed so all of my links are broken... here's a start.

Protecting Software
http://www.macrovision.com/solutions...ng/index.shtml

--
Ken Halter - MS-MVP-VB (visiting from VB6 world) - http://www.vbsight.com
Please keep all discussions in the groups..


Jan 26 '06 #7

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

2
8365
by: R. Rajesh Jeba Anbiah | last post by:
I'm supposed to do the account activation via email. I mean *not* sending the activation link like http://foo.com/foo.php?actcode=foo. But, I would like it to be like <actcode>-activation@domain.com or so. I remember, once I did it by checking the POP3 server. Now, I totally forgot how I did it in PHP or server. Also, I couldn't find any solution/script by Googling. Anyone has the idea? TIA. ---
1
2673
by: JaNE | last post by:
Hello, I have made my cms... and is working, but have some, let me say "bugs"... And I don't know all reasons, please allow me slightly longer and most probably confusing post (that "confusing" is mainly becaose of my bad english, and that bad english is also reason why am I learning php that slow...). As first, what is problem: some users after succsesfull registration and login can not see "memeber_menu" and can not activly participate...
1
2155
by: Matt Dinovo | last post by:
I have a remoting server that is on the same local box as a COM+ managed object with Library Activation. When I try to activate the object from the remoted assembly, I get the following error: "The specified activation could not occur in the client context as specified." The security context of the service application that is activating the object has the proper credentials. It's been years since I've had to deal with COM+ and I'm a bit...
3
3170
by: zz | last post by:
Hello everyone, We have an hybrid plain C++/COM/VB.NET commercial application in which we've included a mandatory activation mechanism. This activation system is programed in the VB.NET part and basically uses the System.net.WebRequest object to do it's job. Works well for the most part but we have serveral client for who it doesn't work. Many of them have been firewall issues, both personnal and corporate ones. We know we won't ever...
30
3178
by: (Pete Cresswell) | last post by:
Just fired it up to see what it looked like. They wanted me to "Activate" the product before the 50th use. Geeze, I paid my money....now they want me to jump through their hoops? Brings back unpleasant memories of Intuit's QuickBooks... When did MS start this? It's not in 2000. 2002?
11
11031
by: Paul Aspinall | last post by:
Hi Can anyone offer any hints / tips for creating registration keys / application activation, as software copy protection measures for a Winform app developed in C#? Thanks
2
2268
by: paully_21 | last post by:
I'm an MSDN Subscriber and I installed VWD...When I activate the product it asks for an activation key...Where do I get one of those? And, more importantly, shouldn't it be part of my MSDN subscription?
11
10103
by: ML | last post by:
Does anyone have any info on sample code for handling activation/licensing for a vb.net app? Just looking for something fairly basic to implement the ability to have an application registered and tied to a specific single PC to help reduce possible piracy. Something where the user would install the app and then send a code via email or phone to the seller who would in turn generate a code to fully unlock the program.
5
3227
by: Andy B | last post by:
I am making a web application that would randomly create an activation code and put it in a database. The web application would then send it in an email to the user with a link to go to and enter the activation code. How would I do this? and what sql server data type would I use? I want the activation code to be no longer than 12 characters, have a mix of numbers and letters and have no special symbols.
0
8403
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
8833
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
8737
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
1
8509
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
8610
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
1
6174
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
5636
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
4327
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
1
2735
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.