473,699 Members | 2,526 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

can this stop piracy

27 New Member
hi all,
I have made a s/w in vb 6 and i want that it should not be pirated.For sake of this what i am thinking to do, once s/w is installed ok, than at first run (.exe) it will generate a unique username and client will tell me that username and i give a password dependent on that user name.Once the correct password is entered s/w will save this in someway so that s/w wont ask for password again as the client is been authenticated by me.

example:
username:AXUQOH 271RQOP
password:(Anyth ing)


What i do to check for the authentication at back end , i change a boolean variable to true and i give password to that access data base.

I want to know that what are the possible breaches(threat s) ???

or if you have better solution than please give me...


Thnax...
Mar 11 '07 #1
11 1318
vijaydiwakar
579 Contributor
hi all,
I have made a s/w in vb 6 and i want that it should not be pirated.For sake of this what i am thinking to do, once s/w is installed ok, than at first run (.exe) it will generate a unique username and client will tell me that username and i give a password dependent on that user name.Once the correct password is entered s/w will save this in someway so that s/w wont ask for password again as the client is been authenticated by me.

example:
username:AXUQOH 271RQOP
password:(Anyth ing)


What i do to check for the authentication at back end , i change a boolean variable to true and i give password to that access data base.

I want to know that what are the possible breaches(threat s) ???

or if you have better solution than please give me...


Thnax...
See we can't directly stop the piracy as if i authenticate any s/w to any user and if he sold his hdd to some one else then.........
but apart that we can restict unauthenticated user by registering key

this is the best method which don't need backend to store the value
to protect hdd problem u may try doongle
Mar 12 '07 #2
baskarpr
33 New Member
I have seen this kind of authentication in a software.
1. When you install software, a 10 digit dynamic key is produced.
2. Client has to call his vendor with this key and his id.
3. A serial no can be produced based on this key and client id. (this is separate program and not given to client)

sounds silly. isnt it ? But very strong.
(may be no one will buy software, perhaps)

Or you can do this ->

1. Generate a dynamic key ( Input is client id ) with your own algorithm. (This is separate program and not given to client )
2. Give that key to application while installation.
3. When program starts up, it compares client id and key. If it matches, application is opened.
Mar 12 '07 #3
softwaregeek
27 New Member
See we can't directly stop the piracy as if i authenticate any s/w to any user and if he sold his hdd to some one else then.........
but apart that we can restict unauthenticated user by registering key

this is the best method which don't need backend to store the value
to protect hdd problem u may try doongle
hi vijaydiwakar,
Thanx for ur reply can u plz clearly tell me the way of using registering key to stop piracy.and for what sake doongle is used?

Thanx...
Mar 12 '07 #4
softwaregeek
27 New Member
I have seen this kind of authentication in a software.
1. When you install software, a 10 digit dynamic key is produced.
2. Client has to call his vendor with this key and his id.
3. A serial no can be produced based on this key and client id. (this is separate program and not given to client)

sounds silly. isnt it ? But very strong.
(may be no one will buy software, perhaps)

Or you can do this ->

1. Generate a dynamic key ( Input is client id ) with your own algorithm. (This is separate program and not given to client )
2. Give that key to application while installation.
3. When program starts up, it compares client id and key. If it matches, application is opened.

hi baskarpr,
the first method is same as what have i written.
but in second method where to store the generated key and i dont get how the exact procedure plz enlighten it ..

thanx...
Mar 12 '07 #5
willakawill
1,646 Top Contributor
How many users do you anticipate buying your software?
What is the market value of your software?
Mar 12 '07 #6
softwaregeek
27 New Member
How many users do you anticipate buying your software?
What is the market value of your software?
How can anybody say that these many copies will be sold
and its market value depends upon the response
Mar 12 '07 #7
willakawill
1,646 Top Contributor
How can anybody say that these many copies will be sold
and its market value depends upon the response
Well those 2 answers tell me all I need to know.
Mar 12 '07 #8
softwaregeek
27 New Member
Well those 2 answers tell me all I need to know.

more than 100 customers and price is 225$
Mar 12 '07 #9
baskarpr
33 New Member
hi baskarpr,
the first method is same as what have i written.
but in second method where to store the generated key and i dont get how the exact procedure plz enlighten it ..

thanx...
I think you can try like this..
1. Receive the random generated id (while installation) and client id from mail.
2. Generate the serial key with these two inputs.
3. Send back through mail.

You should decide whether it is automatic or manual, i.e. receiving random id, client id and generating serial key.
Mar 19 '07 #10

Sign in to post your reply or Sign up for a free account.

Similar topics

2
5202
by: engsol | last post by:
I'm using Python to parse a bunch of s/w test files and make csv files for later report generation by MS ACCESS....(my boss loves the quick turn-around compared to C). Each log file may contain one or more 'sessions', and each session may contain one or more 'nodes'. Each session in the log has an ASCII start and stop time, as does each node. I have the basic parse part done for parameters, errors, etc., but noticed my routine for...
4
1699
by: SoftComplete Development | last post by:
Recently the company SoftComplete Development http://www.softcomplete.com launched the new revolutionary release of software code protection tool. This is large and important step in the software security technologies and in the struggle against software hacking, cracking and piracy. EXECryptor, based on Strongbit Technology, http://www.strongbit.com is a powerful tool to protect code based on a brand new metamorphing code...
2
1761
by: Ben Yanis | last post by:
I've been developing and selling Access based database products for years, and this group has always been a great resource to me. Now I find myself releasing a new Active-X based on some of my code that I've been using for years; and I would like to know what the group thinks of the idea... I have put together a ocx control that allows applications to "phone home"; it sends the developer usage information from anyone using the...
9
1927
by: Lucas | last post by:
Hi, I have an ASP.Net application and I'd like to know about how to protect it from Software Piracy. Are there some alternatives to do that? Thanks a lot LucasC
0
1106
by: Joe | last post by:
Operator Of Massive For-Profit Software Piracy Website Pleads Guilty Caused Up To $20 Million in Losses to Software Industry The owner of a massive for-profit software piracy Web site pleaded guilty in federal court, Assistant Attorney General Alice S. Fisher of the Criminal Division and U.S. Attorney Chuck Rosenberg for the Eastern District of Virginia, announced.
15
4701
by: Ronald S. Cook | last post by:
If I wanted to prevent someone from purchasing my Windows software and then giving to friends, I'm wondering what the top 3 or so options are these days and pros/cons of each. I appreciate any responses, Ron
2
2033
by: Nilesh wadhwani | last post by:
hello friends , Myself Nilesh wadhwani ,LNMIIT colllege, jaipur .I built an software which stop piracy n i want to update documentation which tells about how it works n what r advantages n what r disadvantages compairing to other products of market .So i want to know is there any proper format to do this if yes then pls send it to me and if no then tell me according to you in what format should i write?
0
2193
by: mattcfisher | last post by:
Hi, I have two windows services running together. One is the main program, and one is an "updater" wrapper for the main. The updater service starts and stops the main one (as in you should never start or stop main service manually, only updater). On most computers it works great, the updater's onStop() can start and stop the main service perfectly. On some computers, though, the updater hangs when it tries to stop the main service. It...
2
2524
by: apurva vadera | last post by:
Hi I Am Working On A Project To Stop Piracy In Cd & Vcd So Please Help Me How To Go About
12
2325
by: Pioneer | last post by:
Hi, I would be installing a desktop application on a standalone PC. How do I make sure that owner should not be ableto copy that and/or give it to other folks. In short, how to build measures to avoid piracy? User ID/Password is one of the ways. But that can anyway be shared. Thansk for your inputs. Regards,
0
8705
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
8623
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
0
9197
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
7785
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
6549
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
4390
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
0
4637
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
2
2362
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
3
2015
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.