Dongles would be pretty hard to control in a classroom.
1)They would disappear (practical jokes or wanting to run the software on different machines and not returning them, etc.). 2)The administration of many sets of dongles required to support different applications would make the Tech support people reject products that require them in a classroom setting. 3)Replacing lost dongles for legitimate customers would make the administrative burden for the software/courseware supplier much larger.

Ron

nik crosina wrote:
The circumstances of the particular project I am quoting for would
require the content to be almost exclusively off-line, diskbased, and
to be used in a class room environment. So I explicitly do not want to
rely in any way on authentiofication over on-line resources, as this
will open up a minefield of getting it through various school, college
and corporate fierwalls.

Re the cost aspect , I think, this could be built into the courses as
I imagine they would sell them much miore expdensively than the cost
of a dongle (whcih averages out at about £20.00 (if memory serves
correctly)

Nik

On 4/17/07, Danny Kodicek <[EMAIL PROTECTED]> wrote:

> Hi Nik,
>
> I have done research for my dad a while ago, and I came to
> the conclusion that it wasn't worth the effort $$$ wise.
> > Not sure whether that is applicable to your project, Pete, but has
> > anyone ever used dongle (i.e. hardware) protection for
> their projects?
> > I am currently testing out HASP from Aladdin, and does the
> job so far
> > (have not come very far yet in testing though).
> Yes, the problem with dongles is that it's quite hard to
> implement, right.
> Especially, I would like to advice you not take any of the
> included examples or even consider build on top of it. The
> examples are weak. Please rent some person who is fully into
> the dongle and encryption. If not, it will be lost money.
>
> > What do you guys think about this kind of protection? Why isn't it
> > used more often?
> Because it's a big investment to implement.

Absolutely - distribution costs, particularly, especially as each dongle has
to be unique. We've decided against using them for this reason.

I think there are also cultural differences, though. Some of our
international partners insist that dongle protection is the most common form
in their countries. A lot depends on reliability of internet access for
systems based on online activation (the only other method that seems
genuinely secure).

Danny

_______________________________________________
[email protected]
To change your subscription options or search the archive:
http://chattyfig.figleaf.com/mailman/listinfo/flashcoders

Brought to you by Fig Leaf Software
Premier Authorized Adobe Consulting and Training
http://www.figleaf.com
http://training.figleaf.com



_______________________________________________
[email protected]
To change your subscription options or search the archive:
http://chattyfig.figleaf.com/mailman/listinfo/flashcoders

Brought to you by Fig Leaf Software
Premier Authorized Adobe Consulting and Training
http://www.figleaf.com
http://training.figleaf.com

Reply via email to