Hello all,
I want that nobody can copy files from my cd.
I mean i want to restrict copying of files from a cd.
Thanx
9 2570 Nepomuk 3,112
Recognized Expert Specialist
Hello all,
I want that nobody can copy files from my cd.
I mean i want to restrict copying of files from a cd.
Thanx
Well, you can make it a bit harder than it would normally be by putting a copy protection on the CD, but when searching for the keywords "cd copy protection" on Google, most links are about how to get round these things... Also of course, it's a money issue - are you prepared to pay for the protection and if so how much?
For a little more information on CD copy protection, check wikipedia. They have a few links at the bottom, so as to inform yourself about the various commercial protections there are.
The only real, 100% secure way however to prevent people from copying any data from a CD is not creating the CD in the first place.
Greetings,
Nepomuk
use USB CDROM and keep it in lock and key when u dont need it.
additionally u can make USB storrage enabled/Disabled by making changes in registry. If you want to test this I will provide the tips in next write..
HND
I have made a software for a company now they want that nobody can copy their resources from the CD.
The software is only be played through CD.
And that CD is for sale purpose for public.
So please give me some ideas.
Thanx
>> ALI <<
I have made a software for a company now they want that nobody can copy their resources from the CD.
The software is only be played through CD.
And that CD is for sale purpose for public.
So please give me some ideas.
Thanx
>> ALI <<
You can not simply Can not protect your s/w CD from being copied like this.
YES!!! and if you got any working solution on this let me know, I would like to show you that I can break it.
Trust me you can only give a legal !! Warning !! that CD is copy protected and so and so blah blah .... Technically there is no way to really protect it.
But i think i can do it programatically .
And i will and i m sure that nobody can break that copy restriction.
And i ll also send that thing to you.
Thanx
>> ALI <<
But i think i can do it programatically .
And i will and i m sure that nobody can break that copy restriction.
And i ll also send that thing to you.
Thanx
>> ALI <<
I did not say " YOU CAN NOT PROTECT UR PROGRAM"
What I said is : "You can not technically prevent any one to make duplicate of any CD's"
There is no way to prevent a person from making a copy of the cd. If there was Microsoft, the film industry, the game industry, ect. would be doing this. You can make it harder for a person to copy the CD, but the commercial products are very expensive. You need to do a cost/benefit analysis. How much is protecting that cd really worth, and if someone really wants to copy it they'll still be able to do so.
There is no way to prevent a person from making a copy of the cd. If there was Microsoft......
When we call copy command what happens?????
That file copies into clipboard. Right.
If we clears the clipboard by checking that files. When we detect that the file in clipboard is from the cd we can delete it from clipboard. Can we????
when that thing is not in clipboard how it can be copied to some place.
In such case the only thing is that user will make a virtual drive of that cd. But we can also restrict that thing by detecting the virtual drive using registry when some virtual cd software run it shows a msgbox for copyrights and then closes the programe. For this we need to make a programe which will run automatically when cd is inserted. I think using this idea we can restrict copy from CD.
Is this idea can be done practically????
Thanx
>> ALI <<
NO NO NO....
its simply of no use.
First of all Copy do not take files on clipboard. IT takes file INfo on a clip board.
Secondly there are other ways to make diskcopy which dont use copy / clipboard. (One eg. Linux dd command)
I will can tell you One REAL time IDEA by which you can prevent your prog to run by unauthorised users even if they copied the CD succesfully.
You have to contact me for this as its my profession.
Rgds
HND
Sign in to post your reply or Sign up for a free account.
Similar topics |
by: Xenophobe |
last post by:
I have a popup window (required by the client) containing a form and would
like to prevent users from accessing it directly. They are instead required
to access the page via a hyperlink on another page. HTTP_REFERER, while not
completely reliable, would serve the purpose except for another problem. The
hyperlink points to a JavaScript function which opens the popup. This yields
HTTP_REFERER worthless. My other thought was to create a...
|
by: Dennis C. Drumm |
last post by:
Is there a way with C# to allow one class access to a method or field of
another class, without making that method or field visible to all other
classes, as would be the case when making the method or field public?
Thanks,
Dennis
|
by: volume |
last post by:
Restricting a windows textbox (edit item) to digits only.
Is there a windows option, using .NET C#, to only allow a user to enter
digits ONLY? If so, what is the flag or setting? If no, what is the best
method to manually and robustly do it?
I have a windows form with an editbox that I only want user's to enter
digits.
Thanks in advance.
|
by: Altramagnus |
last post by:
I have searched throught the newsgroups
on how to restrict entry in textboxes, for example,
I only want the textbox to only accept numberic.
The standard answer is to use the KeyPress event.
However, this do not address the paste event
User is still able to copy and paste any characters.
How do I create a textbox so that regardless what I do ( including cut
and paste ),
|
by: amit |
last post by:
hi,
I have a web application using forms based authentication. I want to
restrcit even the non asp.net files from forms authentication i.e I do not
want that my clients should be able to access the word files, ,xls, pdf etc
from outside project. Actually these files appear as links like :
http://hp-amit/testfolder/abc.doc
now if i copy this link and directly type this without loging on to the site
it would still access it. whereas if...
| |
by: CLEAR-RCIC |
last post by:
Hi. I'm using web controls in my web application. Using IIS, I am trying to
restrict an IP address from viewing one of my contols. When I restrict the
IP Address using the Directory Security tab on properties in IIS, it doesn't
seem to work. If I try to restrict a .htm file in the same application it
does work. Does restricting by IP address not work with web controls?
|
by: Piper707 |
last post by:
Hi,
I'd like to know if there are any more ways of restricting an XML
document to having only non-empty tags (containing Strings).
I can think of 2 ways:
1)
<xs:simpleType name="tagName">
|
by: IanH |
last post by:
hi,
I am currently developing an access database for a video library. I
have a Videos Rented Table that includes the Rental ID, Video ID and
the Copy Number. I want to restrict the amount of videos taken out by
each member to 3. How would i go about doing this.
Thanks
Ian
|
by: sneddo |
last post by:
Ok I am trying to do the above, I have got a script that will restrict the length but it requires the user to enter the field and hit a key, before it will work.
This would normaly be find, but the title field gets its information from a previouse page so its value can easily be over 40 chars. (I can not restrict the length on the previouse page.)
The major dificulty is that there is no form on the aspx page, and I do not have access to...
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look !
Part I. Meaning of...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth.
The Art of Business Website Design
Your website is...
| |
by: Hystou |
last post by:
Overview:
Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own....
Now, this would greatly impact the work of software developers. The idea...
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols.
I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
|
by: 6302768590 |
last post by:
Hai team
i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
|
by: muto222 |
last post by:
How can i add a mobile payment intergratation into php mysql website.
| |
by: bsmnconsultancy |
last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...
| |