Solved

How to prevent (or inhibit) copying files from a CD or USB?

Posted on 2011-03-23
3
393 Views
Last Modified: 2012-06-27
I am looking for a way to inhibit people from copying files either from a CD, DVD, or a USB flash. I have read the other similar questions but the proposed solutions don't fit my needs exactly.
I know that true copy protection is probably impossible... The people that will be receiving the information are mostly honest, but I would like to help keep them that way. Also, they are not people who have much time to dedicate to hacking things. I will be selling a compilation of information that a group of people agreed to pay for.  The information contains .swf file type and uses an HTML and JavaScript interface. The Java objects are essential to the readability of the information. I thought of putting the info online and using login info, but I want the information to be accessible offline to the users. To complicate things a bit, I'd like to stay within a budget of $200 for the software.

I have looked at a software called Copy Protect and it looks great except that it cannot deal with HTML, Javascript, or Flash file types. I have looked at a few other programs that seems out dated or that look a bit... suspicious. Does anyone have a good solution to this problem or a recommended software? Thanks for your help!
0
Comment
Question by:MadreDeus
3 Comments
 
LVL 63

Accepted Solution

by:
btan earned 500 total points
ID: 35207523
looks like you wanted some device control and also having embedded protection on the data from being copy out. it may not be all encompassing in single s/w as you do not have access to user machine and have it being restricted. such embedding is more viable for executable instead. nonetheless, see if this can help

http://www.webtoolmaster.com/wtm_e.htm
0
 
LVL 27

Expert Comment

by:Tolomir
ID: 35806921
This question has been classified as abandoned and is closed as part of the Cleanup Program. See the recommendation for more details.
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

There's a lot of hype surrounding blockchain technology. Here's how it works and some of the novel ways it' s now being used - including for data protection.
Smart phones, smart watches, Bluetooth-connected devices—the IoT is all around us. In this article, we take a look at the security implications of our highly connected world.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

680 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question