Your license keys should be in fact signed documents, containing some useful data, signed with your companys private key. Your support department would thank you for this, and you will have lower costs in this area. You dont want every customer calling the technical support because they dont understand if the key contains a l or a 1. If your product is successful, someone will make a key generator in a matter of days from release. Obfuscating the algorithm or hiding an encryption key within your software is really out of the question if you are serious about controlling licensing. ![]() I dont think theres a method of registration so secure that it can survive a good hacker running the program locally.Īs the original comment said, its really all about anything that makes it one step harder than simply copying the file. Use Crossover To Open Verification Over Theīut this solution is already weak ( as the software itself has to include the secret key somewhere ), so I dont think this discovery invalidates the solution as far as it goes.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |