?
Solved

Copy protection

Posted on 2000-04-15
3
Medium Priority
?
191 Views
Last Modified: 2010-04-04
1. A would like a similar protection software as described below:

I have used a program in the past I was able to install a program on my computer two times from one disk. After which, further instalations were useless unless I uninstalled the program back onto the floppy disk.  

2. What you you recommend to be the better software protect method in use other than hardware such as a hardlock?

50 point to steer me in the right direction.

150 more to supply me with the right program.
0
Comment
Question by:Paul_Summers
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 

Accepted Solution

by:
vladi44 earned 150 total points
ID: 2718802
hey, paul, there is a site which would be useful.so go to http://ftp.vse.cz/pub/msdos/SAC/pc/utildisk/0index.txt.
this is a list of files with descriptions.go in the up directory and download what you want..

best regards,
 
              Vladi
0
 
LVL 1

Expert Comment

by:xpher
ID: 2744397
There is a shareware component at
http://www.csse.monash.edu.au/~vtran/
if that is any use.
0
 

Author Comment

by:Paul_Summers
ID: 2746444
THANKS.
0

Featured Post

Concerto's Cloud Advisory Services

Want to avoid the missteps to gaining all the benefits of the cloud? Learn more about the different assessment options from our Cloud Advisory team.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Creating an auto free TStringList The TStringList is a basic and frequently used object in Delphi. On many occasions, you may want to create a temporary list, process some items in the list and be done with the list. In such cases, you have to…
Introduction I have seen many questions in this Delphi topic area where queries in threads are needed or suggested. I know bumped into a similar need. This article will address some of the concepts when dealing with a multithreaded delphi database…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

719 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question