Solved

Application copy protection - bind to particluar hardware

Posted on 2006-07-12
3
272 Views
Last Modified: 2010-04-11
Hello,

How can I protect my code in .NET (web or windows application), so that it runs only on particluar system. I mean to protect it from being copied to another computer. How can I get any parameters of the system, that are unique, and bind my program to them?

Thanks,
Alex
0
Comment
Question by:Alex7777qq
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 40

Accepted Solution

by:
noci earned 125 total points
ID: 17088425
Use a dongle based protection
KEY-LOK, MatrixLock et. al.
Everything without something stored on the dongle that you need in your program can be faked...
(even dongles might have problems when virtual machines are in play).

Google around for it.
0

Featured Post

Forrester Webinar: xMatters Delivers 261% ROI

Guest speaker Dean Davison, Forrester Principal Consultant, explains how a Fortune 500 communication company using xMatters found these results: Achieved a 261% ROI, Experienced $753,280 in net present value benefits over 3 years and Reduced MTTR by 91% for tier 1 incidents.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Active Directory security has been a hot topic of late, and for good reason. With 90% of the world’s organization using this system to manage access to all parts of their IT infrastructure, knowing how to protect against threats and keep vulnerabil…
A hard and fast method for reducing Active Directory Administrators members.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question