![]() ![]() If your goal is to force people to download a cracked EXE from the Internet instead of a key generator from the Internet, then asymmetric cryptography is your answer. If you need a more secure one then there are more sophisticated one. If you need just a simple registration mechanism and you don't mind much about your software being cracked you can use a simple one. If you really need copy protection, you should scatter checks all around the code, maybe encrypting and then decrypting data or code sections using the key - it won't protect you against keygen, anyway and will require more code changes, it's not as simple as calling one function at startup. Anyway code can be disassembled to try to guess the algorithm, some techniques to obfuscate it and make it harder to understand can be used.Īlso, one simple key check is not enough because it can be easily bypassed patching the executable. Some keys can be strings, other can be whole license files (as those used by Delphi itself). There are different ones around, there is not a "generic" one, depends on your needs, some may also include what features to activate or expiry informations. A simple key may not work, usually it used together a machine fingerprint to allow it to be used on given system only.Ī good key generator algorithm should generate keys that are not easily predictable, yet can be checked if valid. But a sound copy protection scheme may be hard to achieve. There are Delphi and non-Delphi libraries (i.e Protexis) available to protect your software - remember that almost anything that works with C can work with Delphi as well. I'd rather not go that far because this requires a lot of effort on the server side.Īny suggestion or link for a robust way to register new users is very welcome. Some registration schemes require an application to check each time at a webserver whether the key is still valid. Is there a best practice way of registering users?.Is it advisable to use some user supplied info in the key, like his name?.I want to use another scheme for my new application but I am not sure what is the best way to do this. It is a simple scheme and someone took the time to crack it by deassembling the code. The application does not check whether the key got invalidated. There is no check on any further validity of the key. To check wether this key is correct a kind of checksum is computed (3-7-11 digit check) which is added as the last 2 digits of the key. When a new user registers an email is sent with a key. If you can’t find answers to your questions here, please take a look at Remotix FAQ or just contact us.For my current application I use a very simple scheme to register new users. Remotix Mobile help is currently available separately for iOS and Android. General information about Remotix Cloud and NEAR protocol is provided in What is Remotix Cloud? section.įor the complete reference on Remotix Agent and Remotix Hub functions, please follow the corresponding Reference sections. To learn how to set up your computer for remote access from the Remotix application, take a look at the Set up anywhere access section. Don’t forget that the quickest way to get access to a remote user’s computer is to ask them to install Remotix QC. To find how to help someone remotely, please refer to the Common Tasks section. Remotix for Mac, Remotix for Windows and Remotix for Linux help is available at Remotix for Desktop Help Index. How to set up a computer you're connecting to.Configure the firewall to accept incoming connections.Configure the network router to accept incoming connections.About setting a stable host name for the computer.Make VNC or RDP server accessible over the Internet.Install VNC, RDP or Screen Sharing server.Capture the remote desktop screen to a file.Share clipboards between client and server.RDP Performance options, file, sound and printer sharing.Transfer files, images and text between client and server.Connect to a Mac using authentication key for SSH.Protect confidential data with master password. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |