Solved

Gaining Clients Computer Info In VB.

Posted on 2004-08-23
6
219 Views
Last Modified: 2010-04-17
Hey,

I have developed an anti cheat patch for a gaming ladder I work for.

And I have had it store cheaters information into a database, which is then used to lock, ban these players from ever using the system again.

But at the moment it only bans ip, username, email etc etc.

Is there anyway I could maybe log a serial or id of a part of the clients hardware that cannot be changed, via a program or reformat??

Any help or suggestions welcome.

Thanks for your time.
0
Comment
Question by:TheJay04
  • 2
  • 2
  • 2
6 Comments
 
LVL 55

Expert Comment

by:Jaime Olivares
ID: 11876796
0
 
LVL 4

Author Comment

by:TheJay04
ID: 11877061
Hey,

Thanks for your suggestion.

Quick question.. If a client is using a usb connected to a modem, rather than a NIC..   Or Dial Up would this make a difference ??

Or would it always be the same ??

Again Thanks,
0
 
LVL 55

Accepted Solution

by:
Jaime Olivares earned 100 total points
ID: 11877116
While user have a NIC, it will work, not matters how it is connected, but if user's computer doesn't have a NIC, then it won't work.

IP is not a good choice because most internet connections uses dynamic ip.

Another choice could be hard disk "physical" (not volume) serial number. More links:
http://www.freevbcode.com/ShowCode.Asp?ID=3380
http://vbnet.mvps.org/index.html?code/disk/deviodriveinfo.htm
0
Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

 
LVL 3

Expert Comment

by:bigjim2000
ID: 11877260
You can get the serial number of their windows installation out of the registry.  It's encrypted, but it is still unique to that computer.

-Eric
0
 
LVL 3

Expert Comment

by:bigjim2000
ID: 11877271
I should append my last comment... it SHOULD be unique among all computers, however, since it is possible to have a pirated copy of windows, there may be duplicates.... but this is all the more reason to ban the users from your network ;-)

-Eric
0
 
LVL 4

Author Comment

by:TheJay04
ID: 11877931
Thanks for your suggestions guys.

The option i have gone with, has been awarded.
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
java constructor error 8 87
mapBully challenge 6 89
base64 decode encode 12 97
eclipse package explorer vs project explorer view 2 32
Purpose To explain how to place a textual stamp on a PDF document.  This is commonly referred to as an annotation, or possibly a watermark, but a watermark is generally different in that it is somewhat translucent.  Watermark’s may be text or graph…
If you’re thinking to yourself “That description sounds a lot like two people doing the work that one could accomplish,” you’re not alone.
An introduction to basic programming syntax in Java by creating a simple program. Viewers can follow the tutorial as they create their first class in Java. Definitions and explanations about each element are given to help prepare viewers for future …
Viewers will learn how to properly install Eclipse with the necessary JDK, and will take a look at an introductory Java program. Download Eclipse installation zip file: Extract files from zip file: Download and install JDK 8: Open Eclipse and …

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now