I was looking to find in myProtector.pas
InvalidSystemTime to try to make one on base of it, but i can't findit.
pr2501
ASKER
I am working to make time trial by myself and i do not know how to resolve the problem if someone copyes encrypted string in regestry of DB at specific date and uses it again after some time whit time turned back.
I started with Experts Exchange in 2004 and it's been a mainstay of my professional computing life since. It helped me launch a career as a programmer / Oracle data analyst
We get it - no one likes a content blocker. Take one extra minute and find out why we block content.
Not exactly the question you had in mind?
Sign up for an EE membership and get your own personalized solution. With an EE membership, you can ask unlimited troubleshooting, research, or opinion questions.
And if someone makes copy of your date information in registry today- when app is working regulary. An then after trial time is over, turne date back on today and pastes the old date information.
Example date today is 30.12.12.
After encryption it becomes 123456.
After some time when tril will be over
Can he write 123456 in regystry and set system date to 30.12.12 and make app run?
Ferruccio Accalai
How could he find this value and copy it if you store it in HKeyClassesRoot using a guid as key? I do so to hide it.
Unlimited question asking, solutions, articles and more.
Ferruccio Accalai
guid, not quid
something like {90B44F61-9DEF-436E-B702-A3D8D137809B}
Press CTRL+SHIFT+G in your delphi ide to create a unique new GUID
pr2501
ASKER
1. I write path in my code for registery
in Hkey......userRoot as somwhere\deeper\tohide.
And the key is always the same.
I have take anodher fast look and i have saw
Guide just as value in registerys. So, can you
explain me what is the connection betwen your
guide and path to registery?
2. Does not the softwares on the net whick can track which registerys were used in time period worries?
Ferruccio Accalai
I repeat, you could use it as key name, not key value, where to store your values, but you could use also a file somewhere in the same way.
Anyway, if you are looking for something that should be not ever cracked you need some hardware key, as any coded program could be cracked.
Finally, there are lot of combinations that you can use just from your mind and concatenate them into one encrypted string, like for example the last access time of a specified file
All of life is about relationships, and EE has made a viirtual community a real community. It lifts everyone's boat
give it a try