I need to protect software using a USB key. Can I just query a USB drive with WMI and obtain the PnPDeviceId from Win32_DiskDrive Class, and compare it with one already hashed and hard coded in the application? How secure is this? Can the PNPDeviceID property be modified? Is hardware coded? Any other idea?
Logically the USB drives are g...
I've been looking for a simple key/license system for our users. Its partly to stop piracy (avoid users from sharing the application around) and the other half to track the number of 'licensed users' we have. I have already read a few good suggestions on SO but I'm curious as to how people have implemented the 30 day evaluation criteria....
Hi,
We currently use Themida for our C/C++ software protection, but the highly number of false positives on anti-virus softwares are disturbing our client base.
Does anyone knows any other software protector as good as
Themida, but without the "make anti-virus crazy" flag?
Thanks.
...
Hi,
I want to continue on my previous question:
http://stackoverflow.com/questions/3007168/torrents-can-i-protect-my-software-by-sending-wrong-bytes
Developer Art suggested to add a unique key to the application, to identifier the cracker.
But JAB said that crackers can search where my unique key is located by checking for binary diffe...
Listing 7.1 The Decryptor of the Cascade Virus
lea si, Start ; position to decrypt (dynamically set)
mov sp, 0682 ; length of encrypted body (1666 bytes)
Decrypt:
xor [si],si ; decryption key/counter 1
xor [si],sp ; decryption key/counter 2
inc si ; increment one counter
dec sp ; decrement the other
jnz De...