Dongles would be pretty hard to control in a classroom.
1)They would disappear (practical jokes or wanting to run the software
on different machines and not returning them, etc.).
2)The administration of many sets of dongles required to support
different applications would make the Tech support people reject
products that require them in a classroom setting.
3)Replacing lost dongles for legitimate customers would make the
administrative burden for the software/courseware supplier much larger.
Ron
nik crosina wrote:
The circumstances of the particular project I am quoting for would
require the content to be almost exclusively off-line, diskbased, and
to be used in a class room environment. So I explicitly do not want to
rely in any way on authentiofication over on-line resources, as this
will open up a minefield of getting it through various school, college
and corporate fierwalls.
Re the cost aspect , I think, this could be built into the courses as
I imagine they would sell them much miore expdensively than the cost
of a dongle (whcih averages out at about £20.00 (if memory serves
correctly)
Nik
On 4/17/07, Danny Kodicek <[EMAIL PROTECTED]> wrote:
> Hi Nik,
>
> I have done research for my dad a while ago, and I came to
> the conclusion that it wasn't worth the effort $$$ wise.
> > Not sure whether that is applicable to your project, Pete, but has
> > anyone ever used dongle (i.e. hardware) protection for
> their projects?
> > I am currently testing out HASP from Aladdin, and does the
> job so far
> > (have not come very far yet in testing though).
> Yes, the problem with dongles is that it's quite hard to
> implement, right.
> Especially, I would like to advice you not take any of the
> included examples or even consider build on top of it. The
> examples are weak. Please rent some person who is fully into
> the dongle and encryption. If not, it will be lost money.
>
> > What do you guys think about this kind of protection? Why isn't it
> > used more often?
> Because it's a big investment to implement.
Absolutely - distribution costs, particularly, especially as each
dongle has
to be unique. We've decided against using them for this reason.
I think there are also cultural differences, though. Some of our
international partners insist that dongle protection is the most
common form
in their countries. A lot depends on reliability of internet access for
systems based on online activation (the only other method that seems
genuinely secure).
Danny
_______________________________________________
[email protected]
To change your subscription options or search the archive:
http://chattyfig.figleaf.com/mailman/listinfo/flashcoders
Brought to you by Fig Leaf Software
Premier Authorized Adobe Consulting and Training
http://www.figleaf.com
http://training.figleaf.com
_______________________________________________
[email protected]
To change your subscription options or search the archive:
http://chattyfig.figleaf.com/mailman/listinfo/flashcoders
Brought to you by Fig Leaf Software
Premier Authorized Adobe Consulting and Training
http://www.figleaf.com
http://training.figleaf.com