Solved

Motherboards with same serial numbers!!!

Posted on 2012-04-03
7
509 Views
Last Modified: 2012-04-08
Dear,
May 2 users have same serial number for the motherboard?
Thx
0
Comment
Question by:hassanayoub85
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
7 Comments
 
LVL 16

Expert Comment

by:l33tf0b
ID: 37803910
I highly doubt that's possible since that's what's used during the RMA process.  The Serial number is usually located on the side of one of the motherboard slots.
To answer your question - Yes, it's unique and no they can not be the same

What exactly are you trying to do?
0
 
LVL 14

Expert Comment

by:Michael Dyer
ID: 37803936
It is possible that they are looking at a part number instead of a serial number - those could be the same.
0
 

Author Comment

by:hassanayoub85
ID: 37803960
2 different answers, still confused.
What I am trying to do is a security for my software, I want to make a unique identifier for users to generate keys based on it.
0
Turn Insights into Action

Communication across every corner of your business is essential to increase the velocity of your application delivery and support pipeline. Automate, standardize, and contextualize your communication processes with xMatters.

 
LVL 12

Expert Comment

by:Dave
ID: 37804019
use the network card mac address. these are unique. serial numbers are not gaurenteed to be unique. On ibm/lenovo the are soft so they may be preserved when one is replaced. sometimes they get left as 0. in any case the numbers are only unique per model so two pcs of different models will often have the same number.

If you are coding on windows you can use guidgen to create a unique serial...

http://msdn.microsoft.com/en-us/library/kw069h38.aspx
0
 

Author Comment

by:hassanayoub85
ID: 37804060
Cannot using MAC, as MAC is changeable!!!
0
 
LVL 69

Assisted Solution

by:Callandor
Callandor earned 100 total points
ID: 37806094
You may want to try cpu properties such as UniqueId and ProcessorId http://msdn.microsoft.com/en-us/library/aa394373(VS.85).aspx, along with hard drive identifiers http://msdn.microsoft.com/en-us/library/aa394132(VS.85).aspx.  But you'll have to provide for the possibility that the user may upgrade their equipment.
0
 
LVL 12

Accepted Solution

by:
Dave earned 400 total points
ID: 37806570
Locking software and a licence to an individual PC is an interesting problem. How do you do it so the user can perform reasonable upgrades with out breaking the software yet present rampant piracy is something no one has yet got right.

Lets face Microsoft follows this process:-

http://technet.microsoft.com/en-us/library/bb457054.aspx#EDAA

to check windows is running on the same PC, I bet you aren't going to follow that?

The MAC address is changeable but you can't use two PCs on the same network segment with the same MAC address. So its a pretty good way of stopping users pirate software round an organization. Not fool proof, but pretty good.  Most everything is changable, so on IBM PC's you can change the serial number with a BIOS utility as per:-

http://forums.windrivers.com/archive/index.php/t-1503.html

If you are going to support old CPU's the the ID can be masked.

If some one really wants to steal your software then they can create a custom hacked virtual machine that reflects the real machine you want to clone. These days there are OpenSource machines dedicated to forensic computing that will simulate most bits on a real machines.

The only secure way to lock software to an individual PC is to use some kind of dongle. I guess that if the software is expensive the this type of tool

http://www.saelig.com/product/U033.htm

with a serial number is the secure choice.
0

Featured Post

[Webinar] Learn How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Like many organizations, your foray into cloud computing may have started with an ancillary or security service, like email spam and virus protection. For some, the first or second step into the cloud was moving email off-premise. For others, a clou…
Windows 7 does not have the best desktop search built in. This is something Windows 7 users have struggled with. You type something in, and your search results don’t always match what you are looking for, or it doesn’t actually work at all. There ar…
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…
Do you want to know how to make a graph with Microsoft Access? First, create a query with the data for the chart. Then make a blank form and add a chart control. This video also shows how to change what data is displayed on the graph as well as form…

717 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question