peter233 Posted February 5, 2009 Share Posted February 5, 2009 Hello guys. I want to code a protection that protects my Tool (which can be bought) so that my customers cannot give it to friends for free because the tool should only work on THEIR Computer ! This is my idea: The tool gets : - Computer Name - Windows User Name Then it crypt the settings with md5. Then i send the customer a tool which generates the md5 string. They send me the string and i write it in the tool that only the customer with this md5 string can execute it. How i can make this? Please help me ! Cu, Peter Link to comment Share on other sites More sharing options...
99ojo Posted February 5, 2009 Share Posted February 5, 2009 (edited) Hello guys.I want to code a protection that protects my Tool (which can be bought) so that my customers cannot give it to friends for free because the tool should only work on THEIR Computer !This is my idea:The tool gets :- Computer Name- Windows User NameThen it crypt the settings with md5.Then i send the customer a tool which generates the md5 string.They send me the string and i write it in the tool that only the customer with this md5 string can execute it.How i can make this? Please help me !Cu,PeterHi,i would do it like this:1) Get the mac adress of customer pc from customer.2) Built with customer mac adress and Function _StringEncrypt a key. Sent the key to customer to import in local registry.3) At startup of your program read the local mac adress, built with Function _StringEncrypt and local mac the key and compare it with the key in localregistryJust read help _StringEncrypt and you should get enough input.Good luck;-))Stefan Edited February 5, 2009 by 99ojo Link to comment Share on other sites More sharing options...
Inverted Posted February 5, 2009 Share Posted February 5, 2009 The mac address is somewhat easy to spoof. I'd use a combination of the first hard disk serial number and something else (maybe username or computername). Also watermark the files, so that you can find out who leaked/cracked it ! Link to comment Share on other sites More sharing options...
99ojo Posted February 5, 2009 Share Posted February 5, 2009 The mac address is somewhat easy to spoof. I'd use a combination of the first hard disk serial number and something else (maybe username or computername).Also watermark the files, so that you can find out who leaked/cracked it !Hi,you are right. Although I would prefer using SID of computer and / or Username instead of real name. This should it make more safe.;-))Stefan Link to comment Share on other sites More sharing options...
peter233 Posted February 5, 2009 Author Share Posted February 5, 2009 Can you give me an Example? Link to comment Share on other sites More sharing options...
yucatan Posted February 5, 2009 Share Posted February 5, 2009 (edited) Can you give me an Example?the best system i think is a tcp server with a username and password databaseu can use a login for the program it connects and sends the username and password and IF the login is good then u send Connected and they may use your program (a nice addon for this is that u can add Versions to it when the user have a old version of ur software they download a new one i have that working )a TCP system liek this is allmost not bypassable... so that works the best for u i thinkand yes i can give u an example Edited February 5, 2009 by yucatan Link to comment Share on other sites More sharing options...
Inverted Posted February 5, 2009 Share Posted February 5, 2009 (edited) Start making something using _StringEncrypt and DriveGetSerial EDIT: Lol at the advice about setting up an authenticating server. Way to go overboard ! Besides it's not difficult to crack that as well. Edited February 5, 2009 by Inverted Link to comment Share on other sites More sharing options...
yucatan Posted February 5, 2009 Share Posted February 5, 2009 Start making something using _StringEncrypt and DriveGetSerialEDIT: Lol at the advice about setting up an authenticating server. Way to go overboard ! Besides it's not difficult to crack that as well.ok try to crack mine tcp ip auth server i dont believe u will sucseed Link to comment Share on other sites More sharing options...
Inverted Posted February 5, 2009 Share Posted February 5, 2009 I won't crack your server, I will crack the program check ! pwned Link to comment Share on other sites More sharing options...
yucatan Posted February 5, 2009 Share Posted February 5, 2009 I won't crack your server, I will crack the program check ! pwned ok then show it sometime then i dont have any server running atm but i am tonigh i send u my .exe and u may do your thing okee ?i just wanne know if thats posseble what u say Link to comment Share on other sites More sharing options...
Bert Posted February 5, 2009 Share Posted February 5, 2009 (edited) Warning - Discussions of cracking software can result in being banned from the forum by a Moderator. DO NOT suggest it, beat around the bush on the subject, nada, nothing. If you are wanting to secure your program, that is fine. Challenging someone to try to break into it is NOT FINE. Arguing about it to the forum Moderators is not a good idea either. A Moderator will quickly silence you if you think otherwise. You are more than welcome to review the BAN thread to see how others have fared when trying to go down this road. http://www.autoitscript.com/forum/index.php?showtopic=33797 Edited February 5, 2009 by Volly The Vollatran project  My blog: http://www.vollysinterestingshit.com/ Link to comment Share on other sites More sharing options...
sandin Posted February 5, 2009 Share Posted February 5, 2009 to secure your script, you could look at this:http://www.autoitscript.com/forum/index.ph...mp;#entry222095 Some cool glass and image menu | WinLIRC remote controler | Happy Holidays to all... | Bounce the sun, a game in which you must save the sun from falling by bouncing it back into the sky | Hook Leadtek WinFast TV Card Remote Control Msges | GDI+ sliding toolbar | MIDI Keyboard (early alpha stage, with lots of bugs to fix) | Alt+Tab replacement | CPU Benchmark with pretty GUI | Ini Editor - Edit/Create your ini files with great ease | Window Manager (take total control of your windows) Pretty GUI! | Pop-Up window from a button | Box slider for toolbar | Display sound volume on desktop | Switch hotkeys with mouse scroll Link to comment Share on other sites More sharing options...
yucatan Posted February 5, 2009 Share Posted February 5, 2009 to secure your script, you could look at this:http://www.autoitscript.com/forum/index.ph...mp;#entry222095volly i respect the autoit rules and i respect that u watch what all the crazy guys are doing here i was just wandering if it is posseble what this guy is saying if it is ? then my script it just not protected enough why is it a problem to let him test that ?or is even that not allowd ?Greetz Yucatan:) Link to comment Share on other sites More sharing options...
Bert Posted February 5, 2009 Share Posted February 5, 2009 The warning is directed:ok try to crack mine tcp ip auth server i dont believe u will sucseedandI won't crack your server, I will crack the program check ! pwned This is NOT cool. The Vollatran project  My blog: http://www.vollysinterestingshit.com/ Link to comment Share on other sites More sharing options...
deathday Posted February 5, 2009 Share Posted February 5, 2009 i also want such a nice script which can protect my tools as well... Link to comment Share on other sites More sharing options...
yucatan Posted February 5, 2009 Share Posted February 5, 2009 (edited) The warning is directed:andThis is NOT cool.okee fine:)can u guyz pleas olso anser my question ?Inverted? pleas anser my question Edited February 5, 2009 by yucatan Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now