Paul Hill <> wrote:
> On 1/28/07, Dave Crozier <[EMAIL PROTECTED]> wrote:
>> Personally I used to use Refox as a form of source protection but
>> gave it up a long time ago on the basis that a selection of product
>> "Branding" where the authorised user is shown on all screens
>
> This is what we do. Put the client name in a table, along with a
> checksum so it can't easily be altered. Make sure the client name
> appears on all reports too.
>
>> Lets face it, for a determined hacker there is no such thing as
>> uncrackable software and to many applications in the fast the ability
>> to copy it for evaluation but then purchase it at a sensible price
>> has actually helped gain it popularity!
>
> In my youth I used to remove copy protection from the odd computer
> game. You can't stop someone with plenty of time and a debugger.
I added a check that UNSET the company name when the name in the table and
the checksum didn't match.
For the company name I placed "Call my company for purchase -
(999)-999-9999" in the table.
I sold to used car dealers and one former employee of a client would steal
from me to make some side money.
Stephen Russell
DBA / .Net Developer
Memphis TN 38115
901.246-0159
"A good way to judge people is by observing how they treat those who
can do them absolutely no good." ---Unknown
http://spaces.msn.com/members/srussell/
--
No virus found in this outgoing message.
Checked by AVG Free Edition.
Version: 7.5.432 / Virus Database: 268.17.12/654 - Release Date: 1/27/2007
5:02 PM
_______________________________________________
Post Messages to: [email protected]
Subscription Maintenance: http://leafe.com/mailman/listinfo/profox
OT-free version of this list: http://leafe.com/mailman/listinfo/profoxtech
** All postings, unless explicitly stated otherwise, are the opinions of the
author, and do not constitute legal or medical advice. This statement is added
to the messages for those lawyers who are too stupid to see the obvious.