Posted on 2009-02-13
Last Modified: 2013-11-15
I have seen pirated software with keygenerators. How do they create these  keygens. How do they find out the logic of the software keys? Basically i want to know how these hackers hack software?
Question by:josephms
    LVL 14

    Accepted Solution

    Of course this information is widely available just by googling.  I think you will get limited details here though.  Here is just one such search result for  ethical hacking that is presented for educational purposes...

    LVL 3

    Author Closing Comment

    Thanks for the info.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    What Security Threats Are You Missing?

    Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

    Suggested Solutions is a cloud-based customer relationship management (CRM) system. In this article, you will learn how to add and map custom lead and contact fields to your Salesforce instance.
    Skype is a P2P (Peer to Peer) instant messaging and VOIP (Voice over IP) service – as well as a whole lot more.
    The viewer will learn how to back up with the free utility from runtime software, DriveImageXML using Windows 7. Download DriveImageXML from Open folder where it was saved: Start installation by double clicking the install scrip…
    An overview on how to enroll an hourly employee into the employee database and how to give them access into the clock in terminal.

    759 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    13 Experts available now in Live!

    Get 1:1 Help Now