Solved

unlimited license

Posted on 1997-05-09
3
347 Views
Last Modified: 2010-04-21
I have a flexlm license for 10 mouth,but I want to extended this  by modifiing the license data.I want to find a method to do this.Obvoisly this is not a legal method but I only want to try.
0
Comment
Question by:yechen
3 Comments
 
LVL 2

Expert Comment

by:mlev
ID: 2006274
Normally, licenses are cryptographically signed,
and forging a cryptographic signature involves solving
a supposedly hard problem.
Maybe you will have a better chance
if you modify *date*, not data :)
0
 

Accepted Solution

by:
salimfadhley earned 100 total points
ID: 2006275
I would advise you not to bother. Here's why:

In order to solve this puzzle you have to work out what the algorythm that generates the key is - not easy to do unless you are really good at reverse assembly.

Once you have solved the first puzzle you need to solve the alorythm for the number of licenses you want. Typicaly the algorythms used for this kind of problem are particularly hard to solve because they are what we call NP-Complete. That is to say solving this problem is just as hard as solving any of the classicaly hard problems like the 'travelling salesman' problem or any number of maze puzzles where the time to solve the problem grows faster than exponentialy with the complexity of the problem.

Althaugh I have not used flexLM, I assume that if it's a good system it will make use of exactly this kind of system to make it hard for you or I to break the protection. I'm afraid only a very unlikely lucky guess will be able to let you cheat the program.
0
 
LVL 2

Expert Comment

by:pxh
ID: 2006276
This is highly illegal. However there is a way, which you can go for test purposes or in emergencies. I.e., assume your license server is down and you want to set up a different machine to do it.

If you want to know, ask.

pxh

0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
CPU monthly average? 12 105
Invalid password trying to cannect to Unix server 2 68
LINUX ZIP - UNCOMPRESS WINDOWS PATH 3 86
How to check the PVU´s on AIX TSM servers? 3 75
Let's say you need to move the data of a file system from one partition to another. This generally involves dismounting the file system, backing it up to tapes, and restoring it to a new partition. You may also copy the file system from one place to…
A metadevice consists of one or more devices (slices). It can be expanded by adding slices. Then, it can be grown to fill a larger space while the file system is in use. However, not all UNIX file systems (UFS) can be expanded this way. The conca…
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…
In a previous video, we went over how to export a DynamoDB table into Amazon S3.  In this video, we show how to load the export from S3 into a DynamoDB table.

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now