Hardware protection and licensing?


Warning: count(): Parameter must be an array or an object that implements Countable in /home/styllloz/code-flow.club/qa-theme/donut-theme/qa-donut-layer.php on line 274
0 like 0 dislike
6 views
Have been puzzled by the question of the quality code and protect itself from hacking and illegal use. Software solutions were considered, however, is now interested in is hardware. Has anybody used, or can be used, something like a HASP key (I only know the Sentinel Protection from safenet-inc, know any other?) or dongle (HASP there, too, but still, plus a bunch of other technologies).


I ordered a kit from Guardant'a — going to experience.


About hacking... Yes, there are emulators, but their writing is not a trivial task. For the same Guardant'and found nothing for the new versions (although it can be bad looking).


What do you use? Interested in is hardware. Worked somebody light with Guardant?
by | 6 views

7 Answers

0 like 0 dislike
On duty worked with a lot of keys and HASP latest and much more...
all keys are easily emulated, well, some maybe not so easy. to write it is necessary nothing, all already written.
PS Sam just for the fun of doing it not from the ceiling say ;)
\r
just use your head, gather the necessary tools in hand and go...
\r
PS now the software has become a little bit smarter and when you start trying to look for in a computer emulator, but it is also all the costs for one Cup of coffee.
by
0 like 0 dislike
Vote for vmprotect.ru/. Its like it comes never really never broke. Besides, he has a special version under www.senselock.ru/ — can be screwed to a serious usb key and execute some code on it.
by
0 like 0 dislike
Will not help you gasp. The only thing that gives guarantees of nanomemory — removal of a small but critical part of the functionality to a remote server.
by
0 like 0 dislike
If you are going to protect their software, it is necessary to use the keys with the possibility of execution of code inside the key.
But there are some nuances.
1) Not every program can be something to put in the key.
2) the Keys with the possibility of code execution is not on Pentium processors. So the code in them is executed.
3) some of the skills Needed for the development of protection for such keys, because the smallest mistake can compromise your entire protection.
\r
VMProtect SE is a very good solution, as it gives an inexperienced developer quick a high level of protection with possibility of further extension of protection by remote update user keys.
by
0 like 0 dislike
Protection Cubase 5, considered one of the most advanced, etc., etc., was hacked for half a year (if memory serves) — it was relatively recently.
There should not forget the truism that the more popular the product, the more likely it will potentially be hacked as an interest to more people.
\r
As written above — the option of transferring part of the functionality on your server might solve the problem, but will have other (at least — the organization and maintenance).
by
0 like 0 dislike
Join Scratch and Antonio43. Look in the direction of
\rVMProtect + SenseLock.
by
0 like 0 dislike
Keys HASP easily emulated, if they are very ancient(HASP4 1996 which uses the same 1C). And for something more recent creation of emulators highly non-trivial task, and with the right approach to the protection, and generally impossible.
In addition in addition to hardware keys are software, and the ability to execute code in keys:
\rsafenet-sentinel.ru/protection/apponchip/
by

Related questions

0 like 0 dislike
5 answers
0 like 0 dislike
6 answers
asked Mar 21, 2019 by xSkyFoXx
0 like 0 dislike
3 answers
0 like 0 dislike
1 answer
110,608 questions
257,186 answers
0 comments
22,964 users