Solved

How does time trial work?

Posted on 2012-12-28
10
358 Views
Last Modified: 2013-01-02
Can you explain me procedures and function in general?
0
Comment
Question by:pr2501
  • 5
  • 5
10 Comments
 
LVL 22

Expert Comment

by:Ferruccio Accalai
ID: 38728987
This question was answered here with a fiew of examples by experts http://www.experts-exchange.com/Programming/Languages/Pascal/Delphi/Q_26921359.html
give it a try
0
 

Author Comment

by:pr2501
ID: 38730423
I can not use it on PC with 64 bit registrys.

I was looking to find in myProtector.pas
InvalidSystemTime to try to make one on base of it, but i can't findit.
0
 

Author Comment

by:pr2501
ID: 38730430
I am working to make time trial  by myself and i do not know how to resolve the problem if someone copyes encrypted string in regestry of DB at specific date and uses it again after some time whit time turned back.
0
Gigs: Get Your Project Delivered by an Expert

Select from freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely and get projects done right.

 
LVL 22

Accepted Solution

by:
Ferruccio Accalai earned 500 total points
ID: 38730603
In my applications I use a combination of  installation date, day counter and last access date, so when I read the string if I find a last access date > of system date time it means that the system time was altered, and that stops the application, otherwise I simply update the last access date and the counter, 'til it don't exceed
0
 

Author Comment

by:pr2501
ID: 38730643
And if someone makes copy of your date information in registry today- when app is working regulary. An then after trial time is over, turne date back on today and pastes the old date information.

Example date today is 30.12.12.
After encryption it becomes 123456.


After some time when tril will be over
Can he write 123456 in regystry and set system date to 30.12.12 and make app run?
0
 
LVL 22

Expert Comment

by:Ferruccio Accalai
ID: 38730926
How could he find this value and copy it if you store it in HKeyClassesRoot using a guid as key? I do so to hide it.
0
 

Author Comment

by:pr2501
ID: 38731177
Thank you.
What is "quid as key" ?
0
 
LVL 22

Expert Comment

by:Ferruccio Accalai
ID: 38731204
guid, not quid

something like {90B44F61-9DEF-436E-B702-A3D8D137809B}

Press CTRL+SHIFT+G in your delphi ide to create a unique new GUID
0
 

Author Comment

by:pr2501
ID: 38732035
1. I write path in my code for registery
in Hkey......userRoot as somwhere\deeper\tohide.
And the key is always the same.
I have take anodher fast look and i have saw
Guide just as value in registerys. So, can you
explain me what is the connection betwen your
guide and path to registery?
2. Does not the softwares on the net whick can track which registerys were used in time period worries?
0
 
LVL 22

Expert Comment

by:Ferruccio Accalai
ID: 38732117
I repeat, you could use it as key name, not key value, where to store your values, but you could use also a file somewhere in the same way.

Anyway, if you are looking for something that should be not ever cracked you need some hardware key, as any coded program could be cracked.

Finally, there are lot of combinations that you can use just from your mind and concatenate them into one encrypted string, like for example the last access time of a specified file
0

Featured Post

Live: Real-Time Solutions, Start Here

Receive instant 1:1 support from technology experts, using our real-time conversation and whiteboard interface. Your first 5 minutes are always free.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A lot of questions regard threads in Delphi.   One of the more specific questions is how to show progress of the thread.   Updating a progressbar from inside a thread is a mistake. A solution to this would be to send a synchronized message to the…
Creating an auto free TStringList The TStringList is a basic and frequently used object in Delphi. On many occasions, you may want to create a temporary list, process some items in the list and be done with the list. In such cases, you have to…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
A short tutorial showing how to set up an email signature in Outlook on the Web (previously known as OWA). For free email signatures designs, visit https://www.mail-signatures.com/articles/signature-templates/?sts=6651 If you want to manage em…

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question