Chris,
Thank you for your response. There is away to find all registry keys when
software is installed. I have a technical program that I've been developing
for nearly a year now and one of the components is a uninstaller, that finds
all registry associated keys to a specific program installation. This is so
that a tech can delete program files, once the program has been surgically
removed from the registry. Example: spyware that hijacks the winsock2 when
it's removed, may have registry entries to reinstall, on reboot or restore,
when the computer reboots. Viruses may have variants that will install, when
the parent is removed etc.
What I'm trying to do, is create a registry entry that gives three dates.
A rollback date, in case someone attempts to rollback their computer clock
to attempt to extend their license demo.
An install date, so I have a start date to time the demo to get the end date
of the demo and the expiration of the beta that will be hard coded in each
demo.
--
Michael Bragg, President
eSolTec, Inc.
a 501(C)(3) organization
MS Authorized MAR
looking for used laptops for developmentally disabled.
"Chris Dunaway" wrote:
eSolTec wrote:
Is there a way to create a registry key, but orphan it from the program that
created it?
I'm not sure what you mean by 'orhpan' but you can use the Registry
classes to create a registry key practically anywhere in the registry.
I don't believe there is any way to determine which program created any
particular registry key.
Reason: Create a key, but not associate it with the program, so that the
program can check for that key to see if the product has been installed and
stop a second installation or illegal installation.
That would not be an effective way to stop an illegal installation.
All someone would have to do would be to use the registry monitoring
app found on SysInternals.Com to watch registry activity.
If not orphan, can you encrypt the Key so that only your program can decrypt
it?
You can certainly encrypt the contents of the registry key but I don't
know about actually encrypting the key itself.