CD security and Data security

Posted on 2003-02-23
Medium Priority
Last Modified: 2010-04-11
i need CD security for a software which i had developed in visual basic.Mass replication of the original CD will render all my efforts waste. How do i prevent the replecated software useless.Is any other software with help of which i can do this.In autodesk products they have a methos wherein on installation of the software, it generates a request code which is machine specific. The client has to send the generated requested code to the firm and get the autorisation code to use the product.How do i do this? I need the code.

The other problem is the software captures data from data files which can be copied and used.I need some way out wherein these data files when copied should not function independently.similarly for animations,photograph and all related backend files. How do I do this?
Question by:baiju

Accepted Solution

blainehilton earned 400 total points
ID: 8006445
I would check out Armadillo which is at http://www.siliconrealms.com/armadillo.shtml  I downloaded a demo of their program a while back for a calculator application, but later decided to make it web based and free.

The program takes your program and puts a "shell" around it.  You can have it hardware locked and/or have them contact you and give you a specific code that you would enter and then you would give them the access code.  There are many varients such as 30 day license, or 10 opens, or limit run time to however length of time you want.

As for your other files I would check out the site above and see if it will protect them too.  If you contact them I'm sure they have a solution since their software did more then anything else I found, and that was over a year ago.

Blaine Hilton

Assisted Solution

nouellette earned 400 total points
ID: 8009282
Safedisc is very popular for CD Security...eheck it out:


Expert Comment

ID: 9954197
No comment has been added lately, so it's time to clean up this TA.
I will leave the following recommendation for this question in the Cleanup topic area:

Split: blainehilton {http:#8006445} & nouellette {http:#8009282}

Please leave any comments here within the next seven days.

EE Page Editor

Featured Post

Evaluating UTMs? Here's what you need to know!

Evaluating a UTM appliance and vendor can prove to be an overwhelming exercise.  How can you make sure that you're getting the security that your organization needs without breaking the bank? Check out our UTM Buyer's Guide for more information on what you should be looking for!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Considering today’s continual security threats, which affect Information technology networks and systems worldwide, it is very important to practice basic security awareness. A normal system user can secure himself or herself by following these simp…
The Internet has made sending and receiving information online a breeze. But there is also the threat of unauthorized viewing, data tampering, and phoney messages. Surprisingly, a lot of business owners do not fully understand how to use security t…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Suggested Courses

615 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question