473,397 Members | 1,969 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,397 software developers and data experts.

Registry Key Orphan

Thank you in advance for any and all assistance.

Is there a way to create a registry key, but orphan it from the program that
created it?

Reason: Create a key, but not associate it with the program, so that the
program can check for that key to see if the product has been installed and
stop a second installation or illegal installation.

If not orphan, can you encrypt the Key so that only your program can decrypt
it?

Michael
Aug 3 '06 #1
3 2051
eSolTec wrote:
Is there a way to create a registry key, but orphan it from the program that
created it?
I'm not sure what you mean by 'orhpan' but you can use the Registry
classes to create a registry key practically anywhere in the registry.
I don't believe there is any way to determine which program created any
particular registry key.
>
Reason: Create a key, but not associate it with the program, so that the
program can check for that key to see if the product has been installed and
stop a second installation or illegal installation.
That would not be an effective way to stop an illegal installation.
All someone would have to do would be to use the registry monitoring
app found on SysInternals.Com to watch registry activity.
>
If not orphan, can you encrypt the Key so that only your program can decrypt
it?
You can certainly encrypt the contents of the registry key but I don't
know about actually encrypting the key itself.

Aug 4 '06 #2
Chris,

Thank you for your response. There is away to find all registry keys when
software is installed. I have a technical program that I've been developing
for nearly a year now and one of the components is a uninstaller, that finds
all registry associated keys to a specific program installation. This is so
that a tech can delete program files, once the program has been surgically
removed from the registry. Example: spyware that hijacks the winsock2 when
it's removed, may have registry entries to reinstall, on reboot or restore,
when the computer reboots. Viruses may have variants that will install, when
the parent is removed etc.

What I'm trying to do, is create a registry entry that gives three dates.

A rollback date, in case someone attempts to rollback their computer clock
to attempt to extend their license demo.

An install date, so I have a start date to time the demo to get the end date
of the demo and the expiration of the beta that will be hard coded in each
demo.
--
Michael Bragg, President
eSolTec, Inc.
a 501(C)(3) organization
MS Authorized MAR
looking for used laptops for developmentally disabled.
"Chris Dunaway" wrote:
eSolTec wrote:
Is there a way to create a registry key, but orphan it from the program that
created it?

I'm not sure what you mean by 'orhpan' but you can use the Registry
classes to create a registry key practically anywhere in the registry.
I don't believe there is any way to determine which program created any
particular registry key.

Reason: Create a key, but not associate it with the program, so that the
program can check for that key to see if the product has been installed and
stop a second installation or illegal installation.

That would not be an effective way to stop an illegal installation.
All someone would have to do would be to use the registry monitoring
app found on SysInternals.Com to watch registry activity.

If not orphan, can you encrypt the Key so that only your program can decrypt
it?

You can certainly encrypt the contents of the registry key but I don't
know about actually encrypting the key itself.

Aug 4 '06 #3
eSolTec wrote:
What I'm trying to do, is create a registry entry that gives three dates.

A rollback date, in case someone attempts to rollback their computer clock
to attempt to extend their license demo.

An install date, so I have a start date to time the demo to get the end date
of the demo and the expiration of the beta that will be hard coded in each
demo.
What I meant is that using the RegMon tool found at SysInternals.Com,
someone can watch the registry while installing your program and see
where the key is located.

For trial versions, I think it is safest for the parts of the program
that restricted to not even be included in the exe. That way, there is
no possibility of a hack. Or if you're wanting a fully functional
demo, then a web service that the app checks to see if it is still
licensed.

That's a tough problem but there should be plenty of discussions on the
web about it.

Good luck.

Chris

Aug 4 '06 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

0
by: John Thorne | last post by:
Have 2 tables ts_sheets : TimeSheet_ID TimeSheet_Date Emp_ID Orphan LineItem TimeSheet_ID Client
3
by: James | last post by:
I need to define paragraphs on my site that should not break across a page when printed, similar to widow/orphan control in Word. Is this possible to implement? We only use IE6 so no cross-platform...
7
by: NickName | last post by:
Hi, Say, a database has all the FK constraints created properly, would sql server 2000 save this kind of meta data into sysforeignkeys table? Or it depends on ...? I'm trying to find all the...
0
by: net guest via DotNetMonster.com | last post by:
Hi, i am facing a lot of problems in killing the orphan excel instances. I approached one method like killing the Excel Orphan with processID. I am getting all the Processess that are running...
0
by: prabhupr | last post by:
Hi Folks In CS project, we use "Add Reference" option to make reference to other assemblies. At times, there a is a chance that few of them get added by mistake or must have got added for some...
1
by: Gunnar | last post by:
Are there any way of detecting that a program have crashed and left an orphan file? I have tried with the filesystemwatcher, but that didn't work. Maybe I can use a polling strategy and keep...
1
by: julian_m | last post by:
I'm working with mysql without referential itegrity. Let me make some small example: tableA +-----------+---------------+ | id_1 | data_1 | +-----------+---------------+ | 1 ...
2
by: julian_m | last post by:
I'm working with mysql without referential itegrity. Let me make some small example: tableA +-----------+---------------+ | id_1 | data_1 | +-----------+---------------+ | 1 ...
2
by: smilem | last post by:
Hi, I use Gallery2 v2.3 system on my web server. When I add and delete photos I see orphan records in my db. The project is opensource and developers are focused on new v3 of the product. However...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.