Thanks Richard and others who've posted on this. Very interesting
articles. Now *all* I need to to do is wrap my brain around all this and
decide how to proceed!
Marty
Marty Knapp wrote:
I like the idea of pre-generated keys. It seems like a good in-between
method. If your user then
Hello,
we have made some difference experiences and so I have to disagree to
Richard and Francois.
We are publishing software in a very small specific market, so no music, no
games. In the first years our software was - in your intention - completely
free of copy protection, later we implemented
Tiemo Hollmann wrote:
In the first years our software was - in your intention - completely
free of copy protection, later we implemented a copy protection on some
programs, which were running off the CD.
We made the experience, that nobody ever thanked us the ease of use and lack
of licensing.
Just tossing out another option for people:
I've found with shareware I've written in the past that - in this day of
internet access - my customers didn't mind at all having to be connected to
the internet in order to gain access to their purchased software (read: ping
a server w/ their license
...@lists.runrev.com [mailto:use-revolution-
boun...@lists.runrev.com] Im Auftrag von Richard Gaskin
Gesendet: Donnerstag, 4. März 2010 18:00
An: How to use Revolution
Betreff: Re: AW: OT: locking software to one specific machine?
Tiemo Hollmann wrote:
In the first years our software was - in your intention
...@lists.runrev.com [mailto:use-revolution-
boun...@lists.runrev.com] Im Auftrag von Richard Gaskin
Gesendet: Donnerstag, 4. März 2010 18:00
An: How to use Revolution
Betreff: Re: AW: OT: locking software to one specific machine?
Tiemo Hollmann wrote:
In the first years our software
Le 4 mars 2010 à 18:37, Tiemo Hollmann TB a écrit :
I did not mentioned that we had also some steps in between.
But many of the per-user licenses can be passed on.
I don't know how Adobe or Microsoft prevent people of passing their user
license to other people.
Tiemo
Adobe requires an
I like the idea of pre-generated keys. It seems like a good in-between
method. If your user then registered their key and someone else
subsequently tried to register the same number you would have some
recourse. I don't want to get bogged down in lots of administrative
hassles, so I like this
We use phone home authorization that uses machine-specific info. In
case of a user with two computers, a hard drive crash, etc., we let
people authorize additional computers with their email address and
password so they always have access to what they've purchased.
We police our database
I was going to make my software refuse to run 15% of the time due to bad
licensing and then catch some smart hackers just due to statistic
misfortune.
I was going to call the system the Schrodingers Quantum Copy Protection
Lock System patent it and win billions from holywood and RIAA!
On Thu,
Marty Knapp wrote:
I like the idea of pre-generated keys. It seems like a good in-between
method. If your user then registered their key and someone else
subsequently tried to register the same number you would have some
recourse. I don't want to get bogged down in lots of administrative
Andre Garzia wrote:
I was going to make my software refuse to run 15% of the time due to bad
licensing and then catch some smart hackers just due to statistic
misfortune.
I was going to call the system the Schrodingers Quantum Copy Protection
Lock System patent it and win billions from holywood
funny tale below:
Once I lost both the serial generator for one of my software and the backup
for the given generator. People were buying the software but I could not
generate the serial for them, then, I remembered that I had not removed some
debug messages. So if invoked thru the terminal from
On Thu, Mar 4, 2010 at 1:18 PM, Richard Gaskin
ambassa...@fourthworld.comwrote:
[... snip ...]
Then write the inverse of the generator to validate your codes, but break
up the validation into multiple handlers each doing a small part of it,
using obscure function names strewn all over your
Jeff Massung wrote:
On Thu, Mar 4, 2010 at 1:18 PM, Richard Gaskin
ambassador at fourthworld.comwrote:
[... snip ...]
Then write the inverse of the generator to validate your codes, but break
up the validation into multiple handlers each doing a small part of it,
using obscure function
On Thu, Mar 4, 2010 at 1:38 PM, Richard Gaskin
ambassa...@fourthworld.comwrote:
Jeff Massung wrote:
On Thu, Mar 4, 2010 at 1:18 PM, Richard Gaskin
ambassador at fourthworld.comwrote:
[... snip ...]
Then write the inverse of the generator to validate your codes, but break
up the
Well I guess the idea that men are basically good at heart is DOA. :-)
Bob
___
use-revolution mailing list
use-revolution@lists.runrev.com
Please visit this url to subscribe, unsubscribe and manage your subscription
preferences:
Jeff Massung wrote:
On Thu, Mar 4, 2010 at 1:38 PM, Richard Gaskin
...
I agree with everything else you wrote, and it seems very reflective of
much of the Delphi Anti-Cracking FAQ, but on this I'm confused:
It seems like we're saying the same thing about obfuscation. Or maybe I
just wrote
While this thread is alive, I've long been curious what the criticisms would be
of the following scheme, for a product with low to medium security needs. This
does assume that you require an internet connection for registration, but that
seems to be a generally acceptable requirement these
Richard Gaskin wrote:
Andre Garzia wrote:
I was going to make my software refuse to run 15% of the time due to bad
licensing and then catch some smart hackers just due to statistic
misfortune.
I was going to call the system the Schrodingers Quantum Copy Protection
Lock System patent it and
On Fri, Mar 5, 2010 at 5:23 AM, Richard Gaskin
ambassa...@fourthworld.com wrote:
Andre Garzia wrote:
I was going to make my software refuse to run 15% of the time due to bad
licensing and then catch some smart hackers just due to statistic
misfortune.
I was going to call the system the
I think this might be very effective at locking people out...
including the developer. The process of observing the password could
change it.
On Mar 4, 2010, at 11:17 AM, Andre Garzia wrote:
I was going to make my software refuse to run 15% of the time due to
bad
licensing and then catch
2010 22:41
An: How to use Revolution
Betreff: Re: AW: OT: locking software to one specific machine?
While this thread is alive, I've long been curious what the criticisms
would be of the following scheme, for a product with low to medium
security needs. This does assume that you require
23 matches
Mail list logo