This topic is interesting to me because until the original post, I was unaware of what a crack was nor did I know of the websites that help "lamers" procure cracks. I would have thought that the large software companies would have sued the crack sites out of existence or had the justice department breathing down their necks. Apparently not, though. Regarding network authentication, if the user buys the software as a download, it seems reasonable to me that they would register their shareware, demo or trialware over the internet as well and would be required to submit their email address to receive the key.I found the following URL to be informative:http://www.woodmann.com/crackz/Tutorials/Protect.htmAt the bottom of the page is Top Protection Tips or things to avoid. It is written by a hacker, obviously. As smart as he appears to be, I don't understand why he doesn't spend his time in pursuits that contribute to reducing suffering in the world, or at least to increasing the size of his wallet if nothing else. I think I'll send him an email and ask him that question. On his site, he seems to be receptive to receiving email messages. If anyone wants to see his response, if he has one, I'll put it on this list.Since I don't know much about this topic, would someone please take a couple of minutes to explain why 128 bit encryption works for data but why it can't be applied to some or all of the code of an executable? Thanks for this topic and all the other information that the subscribers of this list provide. I appreciate it.Steven Hedgepeth
_______________________________________________ Join Excite! - http://www.excite.com The most personalized portal on the Web! _______________________________________________ Unsubscribe or switch delivery mode: <http://www.realsoftware.com/support/listmanager/> Search the archives of this list here: <http://support.realsoftware.com/listarchives/lists.html>
