Solved

crack usb dongle

Posted on 2013-12-24
6
3,006 Views
Last Modified: 2013-12-24
i have i software that open only when i enter usb dongle in computer.

how to remove this dongle .
i want my software work without dongle .
0
Comment
Question by:loveuajay
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
6 Comments
 
LVL 11

Expert Comment

by:Miftaul
ID: 39737739
Could you create an iso image of the usb dongle and then disconnect the usb dongle and mount the iso image using This Link
0
 
LVL 88

Accepted Solution

by:
rindi earned 500 total points
ID: 39737743
As that would breach your terms of use and license agreement with the software maker, we aren't allowed to give any help with that on this site. You must use the dongle. There is no legal way to circumvent it.
0
 

Author Comment

by:loveuajay
ID: 39737761
how i create iso image it's not show in my computer drive
0
 
LVL 88

Expert Comment

by:rindi
ID: 39737773
That won't help, and as I mentioned above already, we aren't allowed to help you crack software licenses on this site. Read EE's Terms of use. Points 5 and 6 are relevant here:

http://www.experts-exchange.com/terms.jsp
0
 
LVL 62

Expert Comment

by:☠ MASQ ☠
ID: 39737805
You could talk to your software supplier - sometimes they need to provide tools to allow their products to be run on virtual machines where a physical USB dongle isn't practical.  They will be able to talk you through the licencing implications.

As others have already pointed out giving you advice on circumventing software copyright protection is otherwise against the Terms of Use of the E-E site and Expertds offering advice that helps to do that has and could put their membership of the site in jeopardy.
0

Featured Post

How Do You Stack Up Against Your Peers?

With today’s modern enterprise so dependent on digital infrastructures, the impact of major incidents has increased dramatically. Grab the report now to gain insight into how your organization ranks against your peers and learn best-in-class strategies to resolve incidents.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
ADFS trust for Skype 4 29
Recomended server racks 3 67
Utility to Scan for Unauthorized Access 4 38
Rear View Camera 27 53
Do you know what to look for when considering cloud computing? Should you hire someone or try to do it yourself? I'll be covering these questions and looking at the best options for you and your business.
Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question