Hi Weyert, Can a dongle easily be circumvented then? What's the best way of protection then, and do you know where I would find a specialist in this?
Thanks, Nik On 4/17/07, Weyert de Boer <[EMAIL PROTECTED]> wrote:
Hi Nik, I have done research for my dad a while ago, and I came to the conclusion that it wasn't worth the effort $$$ wise. > Not sure whether that is applicable to your project, Pete, but has > anyone ever used dongle (i.e. hardware) protection for their projects? > I am currently testing out HASP from Aladdin, and does the job so far > (have not come very far yet in testing though). Yes, the problem with dongles is that it's quite hard to implement, right. Especially, I would like to advice you not take any of the included examples or even consider build on top of it. The examples are weak. Please rent some person who is fully into the dongle and encryption. If not, it will be lost money. > What do you guys think about this kind of protection? Why isn't it > used more often? Because it's a big investment to implement. Yours, Weyert de Boer _______________________________________________ [email protected] To change your subscription options or search the archive: http://chattyfig.figleaf.com/mailman/listinfo/flashcoders Brought to you by Fig Leaf Software Premier Authorized Adobe Consulting and Training http://www.figleaf.com http://training.figleaf.com
-- Nik C _______________________________________________ [email protected] To change your subscription options or search the archive: http://chattyfig.figleaf.com/mailman/listinfo/flashcoders Brought to you by Fig Leaf Software Premier Authorized Adobe Consulting and Training http://www.figleaf.com http://training.figleaf.com

