Solved

unlimited license

Posted on 1997-05-09
3
332 Views
Last Modified: 2010-04-21
I have a flexlm license for 10 mouth,but I want to extended this  by modifiing the license data.I want to find a method to do this.Obvoisly this is not a legal method but I only want to try.
0
Comment
Question by:yechen
3 Comments
 
LVL 2

Expert Comment

by:mlev
Comment Utility
Normally, licenses are cryptographically signed,
and forging a cryptographic signature involves solving
a supposedly hard problem.
Maybe you will have a better chance
if you modify *date*, not data :)
0
 

Accepted Solution

by:
salimfadhley earned 100 total points
Comment Utility
I would advise you not to bother. Here's why:

In order to solve this puzzle you have to work out what the algorythm that generates the key is - not easy to do unless you are really good at reverse assembly.

Once you have solved the first puzzle you need to solve the alorythm for the number of licenses you want. Typicaly the algorythms used for this kind of problem are particularly hard to solve because they are what we call NP-Complete. That is to say solving this problem is just as hard as solving any of the classicaly hard problems like the 'travelling salesman' problem or any number of maze puzzles where the time to solve the problem grows faster than exponentialy with the complexity of the problem.

Althaugh I have not used flexLM, I assume that if it's a good system it will make use of exactly this kind of system to make it hard for you or I to break the protection. I'm afraid only a very unlikely lucky guess will be able to let you cheat the program.
0
 
LVL 2

Expert Comment

by:pxh
Comment Utility
This is highly illegal. However there is a way, which you can go for test purposes or in emergencies. I.e., assume your license server is down and you want to set up a different machine to do it.

If you want to know, ask.

pxh

0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Using libpcap/Jpcap to capture and send packets on Solaris version (10/11) Library used: 1.      Libpcap (http://www.tcpdump.org) Version 1.2 2.      Jpcap(http://netresearch.ics.uci.edu/kfujii/Jpcap/doc/index.html) Version 0.6 Prerequisite: 1.      GCC …
Why Shell Scripting? Shell scripting is a powerful method of accessing UNIX systems and it is very flexible. Shell scripts are required when we want to execute a sequence of commands in Unix flavored operating systems. “Shell” is the command line i…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
In a previous video, we went over how to export a DynamoDB table into Amazon S3.  In this video, we show how to load the export from S3 into a DynamoDB table.

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now