473,396 Members | 1,858 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

Copy protection

Seems like the copy protection (ie licensing/antipiracy) tool that I
used with VB6 isn't very compatible with VB.Net. Anyone have a
recommendation for one that works well with VB.Net applications? Only
basic protection is really needed, so simple to use and cheap are more
important than absolute protection.

JGD
Nov 21 '05 #1
3 3126
Hi,

Licensing.
http://windowsforms.net/articles/Licensing.aspx

Ken
-------------------------
"John Dann" <ne**@prodata.co.uk> wrote in message
news:66********************************@4ax.com...
Seems like the copy protection (ie licensing/antipiracy) tool that I
used with VB6 isn't very compatible with VB.Net. Anyone have a
recommendation for one that works well with VB.Net applications? Only
basic protection is really needed, so simple to use and cheap are more
important than absolute protection.

JGD
Nov 21 '05 #2
Hi John,

I had a similar problem and solved this by using MD5 encryption - do a few
searches on Google and you will find suitable examples. I generate a unique
Key string based on a number f parameters that I ask them to send me. This
does a comparison with the string that their entries will generate, and if
there is a match then the registered version loads. The application that I
distribute works with a server - hence the application is locked to that
server. Below is the function that I used:-

Imports System.Text
Imports System.Security.Cryptography
Module modEncrypt
Public Function HashData(ByVal s As String) As String
'Convert the string to a byte array
Dim bytDataToHash As Byte() = _
(New UnicodeEncoding()).GetBytes(s)
'Compute the MD5 hash algorithm
Dim bytHashValue As Byte() = _
New MD5CryptoServiceProvider().ComputeHash(bytDataToHa sh)
Return BitConverter.ToString(bytHashValue)
End Function
End Module
I call the function with somethin g like:-

txtKeyCode.Text = HashData(sServer & sVersion & sApplication)

txtKeyCode.Text is the Key that I send to them that makes a comparison to
the key genrerated in their application.

Hope this is self explanatory and that it helps you. It seems to work very
well for me.

Paul

<ne**@prodata.co.uk> wrote in message
news:66********************************@4ax.com...
Seems like the copy protection (ie licensing/antipiracy) tool that I
used with VB6 isn't very compatible with VB.Net. Anyone have a
recommendation for one that works well with VB.Net applications? Only
basic protection is really needed, so simple to use and cheap are more
important than absolute protection.

JGD

Nov 21 '05 #3
Thanks Ken and Paul for the replies. The .Net LicenseClass looks
interesting, but I'm struggling a little to follow what I guess are
the C# examples. Presumably there's not a simple VB.Net example
anywhere (I couldn't see one in the download)?

And the roll your own approach is interesting too and probably
adequate for my needs in this instance, but for a WinForm application
that's not locked to an individual PC specification I guess you're
going to need to write something to the registry to persist any key or
licence-dependent information between sessions (since storing in a
simple file would presumably make it too easy to copy). And registry
writing is something I've tended to steer clear of, but maybe I need
to learn more about this.

John Dann
Nov 21 '05 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

79
by: Klaus Bonadt | last post by:
In order to protect software from being copied without licence, I would like to use something like a key, which fits only to the current system. The serial number of the CPU or the current...
75
by: Massimo | last post by:
I'm planning to develop a .NET application using C#, in order to sell it as a shareware and/or as a full package, so I'll need a good way to protect it against piracy. I know some ways to protect...
10
by: Jose Jimenez | last post by:
Hi Folks I wonder if somebody can help me to copy protect a C program that runs under ms-dos compilated with djgpp... and gcc I have seen www.sofpro.com for references but the software has...
4
by: Atz | last post by:
Hi! I'm writing some program for voice commands ( for opening some programs ( word, excel )), i have some problems in this part. I'v downloaded MS Speech SDK for VC++6 but im using .NET. ...
19
by: John | last post by:
I would like to use some third party software for copy protection, software that prevents from copy paste program to another computer (not obfuscator). I am looking for some good solution (hardware...
16
by: conrad | last post by:
What kind of problems could arise if one were to not cast the value of time() to unsigned int? What are the sections in the standard that provide the reasoning of any claims against such a...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.