Solved

Protect Data on CD ROM and prevent Copy

Posted on 2007-04-10
11
1,196 Views
Last Modified: 2009-07-11
Hi guys,
I need to give our customers CD have some data but I need to prevent them to make copy from this CD so how can I please protect data on a CD ??
 
Thanks ,
Nibal
0
Comment
Question by:nnnddd
11 Comments
 
LVL 27

Accepted Solution

by:
Tolomir earned 63 total points
ID: 18880934
0
 
LVL 53

Expert Comment

by:Infinity08
ID: 18881007
>> http://www.flickr.com/photos/7729573@N03/

It depends what data it is. Star Force afaik is only for executables.

Normal data can simply be copied.

You would have to have a reader application on the CD, and only that reader can read the data. Depends if you want to go that far.

What kind of data is it ? Documents ?
0
 
LVL 62

Expert Comment

by:☠ MASQ ☠
ID: 18881133
Bottom line - you can't make it copy proof you can only make it difficult to copy.
0
What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

 

Author Comment

by:nnnddd
ID: 18883628
Dear Tolomir,
how can get demo copy from this software ?

Dear Infinity08,
yes data is PDF and Documents,

Thanks
0
 
LVL 27

Expert Comment

by:Tolomir
ID: 18883842
Just send a request to:

sales@star-force.com

Tolomir
0
 
LVL 53

Assisted Solution

by:Infinity08
Infinity08 earned 62 total points
ID: 18884052
>> yes data is PDF and Documents,

That's what I was afraid of. Unless you encrypt the data, and find some way to make the data readable ONLY with your application on YOUR cd, then they can simply copy the data, no matter what you do.

So, two things to do :

1) an application that can only run on your cd : that can be achieved with protections like StarForce (as pointed out by Tolomir)

2) encrypt data so they're only readable with your application : that's harder, since your application will somehow have to contain the decryption key, so you'll need to hide it in there pretty well to avoid that people extract it from the executable.


Be aware that none of these are 100% solutions !! A determined person that wants to copy the data will be able to do so.
Furthermore, be aware that this is a very cumbersome way of doing things, and your customers might not be very happy about it. Imo, you need to have a very good reason for this.
0
 
LVL 53

Expert Comment

by:Infinity08
ID: 19100000
Since there were no further questions from nnnddd, I assume that his question was answered. Imo all participating experts made valid helpful comments, and a PAQ would allow others to see them.
0
 
LVL 2

Expert Comment

by:timmcqueen
ID: 24830155
CD is not a reliable media to lock your PDFs to.

It's better to look for solutions which can protect and lock down the PDF contents of your CD to users specific computers.

Here are some related tools
FileOpen Publisher
PDF Security OwnerGuard
Protected PDF
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
reclamation process error on TSM 6 65
Binaries of LibRsync needed 2 35
Sky and freeview box 3 37
Is my HP C7000 enclosure failing? 2 31
The article will include the best Data Recovery Tools along with their Features, Capabilities, and their Download Links. Hope you’ll enjoy it and will choose the one as required by you.
Many companies are looking to get out of the datacenter business and to services like Microsoft Azure to provide Infrastructure as a Service (IaaS) solutions for legacy client server workloads, rather than continuing to make capital investments in h…
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…
This tutorial will walk an individual through the process of configuring basic necessities in order to use the 2010 version of Data Protection Manager. These include storage, agents, and protection jobs. Launch Data Protection Manager from the deskt…

816 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

8 Experts available now in Live!

Get 1:1 Help Now