> , disk layout info but with no success. The best I have been able to do is dam
> age disk information. Can someone please help me?
Frank,
Why not get one of these keys you need to plug to the parallel port in order
to run your program ? You can still use your printer. I bet that'd save
you time and money.
The down side of copy-protection is, of course, that many users won't buy
your applications just because it's copy protected and all the related
hassle.
Greetings,
Sergio Terenas
I strongly agree, dongles are not a good solution, but what is? I think the
ideal solution is to be able to make your original disk UNCOPIABLE to all
but say 5% of the best hackers. Have your program set up so that it can only
be installed from the original disk (not by simply copying files from one
computer to another), and have the disk so it can't be copied. Is this
possible though? Anybody out there looking for a program to write that has
huge market demand? Well, here it is, go for it!
--
Justin MacLeod, Bell Northern Research/Northern Telecom, Ottawa, Canada
Rod.
The old commodore 64 (think back now...) software used to be protected
through soft errors on the diskettes. The program would expect to find a
specific error on a track/sector and pooch out if it didn't find it.
This worked fine until copy code started showing up that would reproduce
the same errors on a target diskette. It became a cat and mouse game. It
made the aoftware harder to copy. People began to realize that it was more
fun and challenging to copy programs than it was to actually use them.
There's a moral in there somewhere...
- I like people, I just can't stand their ways.
--
ss>In article <94289.12...@CUNYVM.CUNY.EDU>
ss><A3...@CUNYVM.CUNY.EDU> wrote :
ss>
ss>> , disk layout info but with no success. The best I have been able to
ss>do is dam
ss>> age disk information. Can someone please help me?
ss>
ss>Frank,
ss>Why not get one of these keys you need to plug to the parallel port in
ss>order
ss>to run your program ? You can still use your printer. I bet that'd save
ss>you time and money.
ss>
ss>The down side of copy-protection is, of course, that many users won't buy
ss>your applications just because it's copy protected and all the related
ss>hassle.
ss>
ss>Greetings,
ss>Sergio Terenas
ss>
ss>
Hey, stop for a while. If everyone was starting to use "dongles" (keys) to
prevent unauthorized people to use their programs, where would we end? I
don't want to switch "dongles" (imagine having 20 of those in your drawer)
every time I use a program, so there must be another way. That's my opinion
and I'm pretty sure there are a LOT of other people that means the same. I
believe it's a little bit better with a key disk, but on the other hand I
don't like this either.
Regards,
-----------------------------
*** Lars Jacobsen ***
Software-Engineer
E-mail : la...@powertech.no
-----------------------------
~~~
* VbReader 2.01 #NR * What has four legs and an arm? A happy pitbull.
The good solution? It is what most platforms do: provide a standard
host ID mechanism. All we have to do is persuade Microsoft and Intel
to implement this very standard approach.
Russell
--
Q: What do you call a musician without a girlfriend?
A: Homeless.
As one who's cleaned up his act, I thought you should be told.
(Please don't kick me out; I'm a reformed character!)
Cheers
Bryan
******************************************************************
* Bell Farm, Sandy Lane * * A Gentleman is someone who *
* Chippenham, Wiltshire * * never drinks gin before six *
* UK, +44, 0380 850261 * * and alway takes his hat off *
* * * before hitting a lady - W Churchill *
******************************************************************