Solved

How does time trial work?

Posted on 2012-12-28
10
363 Views
Last Modified: 2013-01-02
Can you explain me procedures and function in general?
0
Comment
Question by:pr2501
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 5
  • 5
10 Comments
 
LVL 22

Expert Comment

by:Ferruccio Accalai
ID: 38728987
This question was answered here with a fiew of examples by experts http://www.experts-exchange.com/Programming/Languages/Pascal/Delphi/Q_26921359.html
give it a try
0
 

Author Comment

by:pr2501
ID: 38730423
I can not use it on PC with 64 bit registrys.

I was looking to find in myProtector.pas
InvalidSystemTime to try to make one on base of it, but i can't findit.
0
 

Author Comment

by:pr2501
ID: 38730430
I am working to make time trial  by myself and i do not know how to resolve the problem if someone copyes encrypted string in regestry of DB at specific date and uses it again after some time whit time turned back.
0
Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 
LVL 22

Accepted Solution

by:
Ferruccio Accalai earned 500 total points
ID: 38730603
In my applications I use a combination of  installation date, day counter and last access date, so when I read the string if I find a last access date > of system date time it means that the system time was altered, and that stops the application, otherwise I simply update the last access date and the counter, 'til it don't exceed
0
 

Author Comment

by:pr2501
ID: 38730643
And if someone makes copy of your date information in registry today- when app is working regulary. An then after trial time is over, turne date back on today and pastes the old date information.

Example date today is 30.12.12.
After encryption it becomes 123456.


After some time when tril will be over
Can he write 123456 in regystry and set system date to 30.12.12 and make app run?
0
 
LVL 22

Expert Comment

by:Ferruccio Accalai
ID: 38730926
How could he find this value and copy it if you store it in HKeyClassesRoot using a guid as key? I do so to hide it.
0
 

Author Comment

by:pr2501
ID: 38731177
Thank you.
What is "quid as key" ?
0
 
LVL 22

Expert Comment

by:Ferruccio Accalai
ID: 38731204
guid, not quid

something like {90B44F61-9DEF-436E-B702-A3D8D137809B}

Press CTRL+SHIFT+G in your delphi ide to create a unique new GUID
0
 

Author Comment

by:pr2501
ID: 38732035
1. I write path in my code for registery
in Hkey......userRoot as somwhere\deeper\tohide.
And the key is always the same.
I have take anodher fast look and i have saw
Guide just as value in registerys. So, can you
explain me what is the connection betwen your
guide and path to registery?
2. Does not the softwares on the net whick can track which registerys were used in time period worries?
0
 
LVL 22

Expert Comment

by:Ferruccio Accalai
ID: 38732117
I repeat, you could use it as key name, not key value, where to store your values, but you could use also a file somewhere in the same way.

Anyway, if you are looking for something that should be not ever cracked you need some hardware key, as any coded program could be cracked.

Finally, there are lot of combinations that you can use just from your mind and concatenate them into one encrypted string, like for example the last access time of a specified file
0

Featured Post

Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this tutorial I will show you how to use the Windows Speech API in Delphi. I will only cover basic functions such as text to speech and controlling the speed of the speech. SAPI Installation First you need to install the SAPI type library, th…
Hello everybody This Article will show you how to validate number with TEdit control, What's the TEdit control? TEdit is a standard Windows edit control on a form, it allows to user to write, read and copy/paste single line of text. Usua…
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

695 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question