473,320 Members | 1,910 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,320 software developers and data experts.

single user software installation

does anybody know how to make the program as a single user
installation, meaning that the program only can install on one pc but
can't on others pc??
Jul 17 '05 #1
6 3192
You could do that with the help of a CD and a key diskette and have the
program write on the diskette somewhere that it has been
installed...therefore to install to another computer, the program must be
uninstalled from it's original computer first.

--
Stéphane Richard

"ZaGras" <za*******@hotmail.com> wrote in message
news:ef**************************@posting.google.c om...
does anybody know how to make the program as a single user
installation, meaning that the program only can install on one pc but
can't on others pc??

Jul 17 '05 #2
On Sat, 01 Nov 2003 02:17:29 GMT, Stephane Richard <[email deleted]>
wrote:
You could do that with the help of a CD and a key diskette and have the
program write on the diskette somewhere that it has been
installed...therefore to install to another computer, the program must be
uninstalled from it's original computer first.


Except that disk-imaging software can get around that pretty easily.
--
auric "underscore" "underscore" "at" hotmail "dot" com
*****
This marks Logical End-Of-Message. Physical EOM follows...
Jul 17 '05 #3
Auric__ <no*********@email.address> wrote in message news:<q8********************************@4ax.com>. ..
On Sat, 01 Nov 2003 02:17:29 GMT, Stephane Richard <[email deleted]>
wrote:
You could do that with the help of a CD and a key diskette and have the
program write on the diskette somewhere that it has been
installed...therefore to install to another computer, the program must be
uninstalled from it's original computer first.


Except that disk-imaging software can get around that pretty easily.


wat is the disk-imaging software about? way can i get it? 10s 4 help
Jul 17 '05 #4
Thus spake za*******@hotmail.com (ZaGras):
>You could do that with the help of a CD and a key diskette and have
>the program write on the diskette somewhere that it has been
>installed...therefore to install to another computer, the program
>must be uninstalled from it's original computer first.


Except that disk-imaging software can get around that pretty easily.


wat is the disk-imaging software about? way can i get it? 10s 4 help


He means that if you rely on a key diskette or CD to protect your software,
a pirate can just use disk-imaging software (Symantec Ghost, for example)
to make an exact copy of your key disk. Verrrrry weak protection.

Jul 17 '05 #5
MT Head <No********@noWhere.com> wrote in message news:<Xn**********************************@207.103 .26.25>...
Thus spake za*******@hotmail.com (ZaGras):
>You could do that with the help of a CD and a key diskette and have
>the program write on the diskette somewhere that it has been
>installed...therefore to install to another computer, the program
>must be uninstalled from it's original computer first.

Except that disk-imaging software can get around that pretty easily.


wat is the disk-imaging software about? way can i get it? 10s 4 help


He means that if you rely on a key diskette or CD to protect your software,
a pirate can just use disk-imaging software (Symantec Ghost, for example)
to make an exact copy of your key disk. Verrrrry weak protection.


10s for ur explanation.any better protection method?
Jul 17 '05 #6
On 2 Nov 2003 07:46:47 -0800, ZaGras <[email deleted]> wrote:
MT Head <No********@noWhere.com> wrote in message news:<Xn**********************************@207.103 .26.25>...
Thus spake za*******@hotmail.com (ZaGras):
>> >You could do that with the help of a CD and a key diskette and have
>> >the program write on the diskette somewhere that it has been
>> >installed...therefore to install to another computer, the program
>> >must be uninstalled from it's original computer first.
>>
>> Except that disk-imaging software can get around that pretty easily.
>
> wat is the disk-imaging software about? way can i get it? 10s 4 help
>


He means that if you rely on a key diskette or CD to protect your software,
a pirate can just use disk-imaging software (Symantec Ghost, for example)
to make an exact copy of your key disk. Verrrrry weak protection.


10s for ur explanation.any better protection method?


Use a dongle (a hardware device that must be connected to the computer
for the program to run). Have it connect to a server on the internet and
send some hardware specific information in order to register.

Unfortunately, there is no protection that can truly get around a
determined cracker. Go to any warez newsgroup and you will see literally
thousands of programs posted that have had their respective protection
schemes broken by crackers - passwords, time limits, dongles, CD checks,
server verification - all rendered ineffective.

On an unrelated note, please take the time to type out "thanks" instead
of "10s" - it's only 3 more keys and is a lot easier to understand.
--
auric "underscore" "underscore" "at" hotmail "dot" com
*****
Vote Anarchist
Jul 17 '05 #7

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

26
by: Simon | last post by:
I'm doing a survey. When do you think GNU/Linux will be ready for the average Joe? What obstacles must it overcome first?
6
by: Jim Wood | last post by:
Hi. I don't do any software development, but had to download and install dot-net Framework 1.1 in order to install a Lantronics device-installer utility. I see that Framework has added itself to...
5
by: Ranju. V | last post by:
Hi, I use a lot asynchronous XMLHTTP from JavaScript. Are the callbacks that we register with XMLHTTP guaranteed to execute single-threaded? For instance, consider the following code snippet. ...
7
by: Dennis C. Drumm | last post by:
Can my program access the HKEY_LOCAL_MACHINE/Software section of the registry when being used by a user with restricted rights (not with admin rights)? If so, how? I have a program that...
3
by: Jiho Han | last post by:
Should ASPNET user belong to the local Users group? I may have made some changes that affected my workstation setup and I am experiencing some unexpected behaviors. For example, I have my IIS...
13
by: Kevin Walzer | last post by:
Which of the Windows/Unix package builders for Python applications is capable of creating single-file executables? I'm thinking of: 1. py2exe 2. Mcmillan Installer/PyInstaller 3. cxfreeze ...
7
by: ashley.ward | last post by:
We have been using VB6 to develop small custom apps that access an Oracle database, in order to extend a larger product that is developed by our colleagues in Germany (who use C++ and Java). As...
7
by: hamarsheh | last post by:
Hi everbody! i need single sign on software for our php website , For all application, because we used visual basic and php, and another things so we need software to do single sign on , that the...
6
by: theinvisibleGhost | last post by:
Is there a method of determining which format the short date format is stored in for the current user on the machine using .NET? If it is not in UK format I ideally need to be able to set it to...
0
by: DolphinDB | last post by:
Tired of spending countless mintues downsampling your data? Look no further! In this article, you’ll learn how to efficiently downsample 6.48 billion high-frequency records to 61 million...
0
by: ryjfgjl | last post by:
ExcelToDatabase: batch import excel into database automatically...
0
isladogs
by: isladogs | last post by:
The next Access Europe meeting will be on Wednesday 6 Mar 2024 starting at 18:00 UK time (6PM UTC) and finishing at about 19:15 (7.15PM). In this month's session, we are pleased to welcome back...
1
isladogs
by: isladogs | last post by:
The next Access Europe meeting will be on Wednesday 6 Mar 2024 starting at 18:00 UK time (6PM UTC) and finishing at about 19:15 (7.15PM). In this month's session, we are pleased to welcome back...
0
by: Vimpel783 | last post by:
Hello! Guys, I found this code on the Internet, but I need to modify it a little. It works well, the problem is this: Data is sent from only one cell, in this case B5, but it is necessary that data...
0
by: ArrayDB | last post by:
The error message I've encountered is; ERROR:root:Error generating model response: exception: access violation writing 0x0000000000005140, which seems to be indicative of an access violation...
0
by: Defcon1945 | last post by:
I'm trying to learn Python using Pycharm but import shutil doesn't work
1
by: Shællîpôpï 09 | last post by:
If u are using a keypad phone, how do u turn on JavaScript, to access features like WhatsApp, Facebook, Instagram....
0
by: af34tf | last post by:
Hi Guys, I have a domain whose name is BytesLimited.com, and I want to sell it. Does anyone know about platforms that allow me to list my domain in auction for free. Thank you

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.