hi all,
I have made a s/w in vb 6 and i want that it should not be pirated.For sake of this what i am thinking to do, once s/w is installed ok, than at first run (.exe) it will generate a unique username and client will tell me that username and i give a password dependent on that user name.Once the correct password is entered s/w will save this in someway so that s/w wont ask for password again as the client is been authenticated by me.
example:
username:AXUQOH 271RQOP
password:(Anyth ing)
What i do to check for the authentication at back end , i change a boolean variable to true and i give password to that access data base.
I want to know that what are the possible breaches(threat s) ???
or if you have better solution than please give me...
Thnax...
11 1318
hi all,
I have made a s/w in vb 6 and i want that it should not be pirated.For sake of this what i am thinking to do, once s/w is installed ok, than at first run (.exe) it will generate a unique username and client will tell me that username and i give a password dependent on that user name.Once the correct password is entered s/w will save this in someway so that s/w wont ask for password again as the client is been authenticated by me.
example:
username:AXUQOH 271RQOP
password:(Anyth ing)
What i do to check for the authentication at back end , i change a boolean variable to true and i give password to that access data base.
I want to know that what are the possible breaches(threat s) ???
or if you have better solution than please give me...
Thnax...
See we can't directly stop the piracy as if i authenticate any s/w to any user and if he sold his hdd to some one else then.........
but apart that we can restict unauthenticated user by registering key
this is the best method which don't need backend to store the value
to protect hdd problem u may try doongle
I have seen this kind of authentication in a software.
1. When you install software, a 10 digit dynamic key is produced.
2. Client has to call his vendor with this key and his id.
3. A serial no can be produced based on this key and client id. (this is separate program and not given to client)
sounds silly. isnt it ? But very strong.
(may be no one will buy software, perhaps)
Or you can do this ->
1. Generate a dynamic key ( Input is client id ) with your own algorithm. (This is separate program and not given to client )
2. Give that key to application while installation.
3. When program starts up, it compares client id and key. If it matches, application is opened.
See we can't directly stop the piracy as if i authenticate any s/w to any user and if he sold his hdd to some one else then.........
but apart that we can restict unauthenticated user by registering key
this is the best method which don't need backend to store the value
to protect hdd problem u may try doongle
hi vijaydiwakar,
Thanx for ur reply can u plz clearly tell me the way of using registering key to stop piracy.and for what sake doongle is used?
Thanx...
I have seen this kind of authentication in a software.
1. When you install software, a 10 digit dynamic key is produced.
2. Client has to call his vendor with this key and his id.
3. A serial no can be produced based on this key and client id. (this is separate program and not given to client)
sounds silly. isnt it ? But very strong.
(may be no one will buy software, perhaps)
Or you can do this ->
1. Generate a dynamic key ( Input is client id ) with your own algorithm. (This is separate program and not given to client )
2. Give that key to application while installation.
3. When program starts up, it compares client id and key. If it matches, application is opened.
hi baskarpr,
the first method is same as what have i written.
but in second method where to store the generated key and i dont get how the exact procedure plz enlighten it ..
thanx...
How many users do you anticipate buying your software?
What is the market value of your software?
How many users do you anticipate buying your software?
What is the market value of your software?
How can anybody say that these many copies will be sold
and its market value depends upon the response
How can anybody say that these many copies will be sold
and its market value depends upon the response
Well those 2 answers tell me all I need to know.
Well those 2 answers tell me all I need to know.
more than 100 customers and price is 225$
hi baskarpr,
the first method is same as what have i written.
but in second method where to store the generated key and i dont get how the exact procedure plz enlighten it ..
thanx...
I think you can try like this..
1. Receive the random generated id (while installation) and client id from mail.
2. Generate the serial key with these two inputs.
3. Send back through mail.
You should decide whether it is automatic or manual, i.e. receiving random id, client id and generating serial key.
Sign in to post your reply or Sign up for a free account.
Similar topics |
by: engsol |
last post by:
I'm using Python to parse a bunch of s/w test files and make csv files for later report generation by MS ACCESS....(my boss
loves the quick turn-around compared to C). Each log file may contain one or more 'sessions', and each session may contain
one or more 'nodes'.
Each session in the log has an ASCII start and stop time, as does each node.
I have the basic parse part done for parameters, errors, etc., but noticed my routine for...
|
by: SoftComplete Development |
last post by:
Recently the company SoftComplete Development
http://www.softcomplete.com launched the new revolutionary release of
software code protection tool. This is large and important step in the
software security technologies and in the struggle against software
hacking, cracking and piracy.
EXECryptor, based on Strongbit Technology, http://www.strongbit.com
is a powerful tool to protect code based on a brand new metamorphing
code...
|
by: Ben Yanis |
last post by:
I've been developing and selling Access based database products for
years, and this group has always been a great resource to me. Now I
find myself releasing a new Active-X based on some of my code that
I've been using for years; and I would like to know what the group
thinks of the idea...
I have put together a ocx control that allows applications to "phone
home"; it sends the developer usage information from anyone using the...
|
by: Lucas |
last post by:
Hi,
I have an ASP.Net application and I'd like to know about how to protect it
from Software Piracy. Are there some alternatives to do that?
Thanks a lot
LucasC
|
by: Joe |
last post by:
Operator Of Massive For-Profit Software
Piracy Website Pleads Guilty
Caused Up To $20 Million in Losses to Software Industry
The owner of a massive for-profit software piracy Web site pleaded
guilty in federal court, Assistant Attorney General Alice S. Fisher of
the Criminal Division and U.S. Attorney Chuck Rosenberg for the Eastern
District of Virginia, announced.
| |
by: Ronald S. Cook |
last post by:
If I wanted to prevent someone from purchasing my Windows software and then
giving to friends, I'm wondering what the top 3 or so options are these days
and pros/cons of each.
I appreciate any responses,
Ron
|
by: Nilesh wadhwani |
last post by:
hello friends ,
Myself Nilesh wadhwani ,LNMIIT colllege, jaipur .I built an software which stop piracy n i want to update documentation which tells about how it works n what r advantages n what r disadvantages compairing to other products of market .So i want to know is there any proper format to do this if yes then pls send it to me and if no then tell me according to you in what format should i write?
|
by: mattcfisher |
last post by:
Hi,
I have two windows services running together. One is the main
program, and one is an "updater" wrapper for the main. The updater
service starts and stops the main one (as in you should never start or
stop main service manually, only updater).
On most computers it works great, the updater's onStop() can start and
stop the main service perfectly. On some computers, though, the
updater hangs when it tries to stop the main service. It...
|
by: apurva vadera |
last post by:
Hi I Am Working On A Project To Stop Piracy In Cd & Vcd So Please Help Me How To Go About
|
by: Pioneer |
last post by:
Hi,
I would be installing a desktop application on a standalone PC.
How do I make sure that owner should not be ableto copy that and/or
give it to other folks.
In short, how to build measures to avoid piracy?
User ID/Password is one of the ways. But that can anyway be shared.
Thansk for your inputs.
Regards,
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look !
Part I. Meaning of...
| |
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it.
First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed.
This is as boiled down as I can make it.
Here is my compilation command:
g++-12 -std=c++20 -Wnarrowing bit_field.cpp
Here is the code in...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own....
Now, this would greatly impact the work of software developers. The idea...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules.
He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms.
Adolph will...
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols.
I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
|
by: adsilva |
last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
| |
by: muto222 |
last post by:
How can i add a mobile payment intergratation into php mysql website.
|
by: bsmnconsultancy |
last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...
| |