?
Solved

VB.net Emailing Something Unique about a computer

Posted on 2014-01-18
7
Medium Priority
?
255 Views
Last Modified: 2014-01-19
Hi

Since I have been told that it is relatively easy for a beginner hacker to reverse engineer
my code I thought that a simple way to protect my software would be to check something unique about the user's computer (is this a registry key?) and then use this in the code sent to them to make sure that it can only be used on that computer. How would I do this?
0
Comment
Question by:Murray Brown
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
  • 2
7 Comments
 
LVL 28

Assisted Solution

by:Ark
Ark earned 1000 total points
ID: 39791820
First of all, what type of application do you produce? Stand alone WinForm, Web app, web service? Second, 'unique' doesn't mean 'persistent' - user can change motherboard/proc/HDD/netcard - does (s)hi need inform you about this?
If you realy have valuable application I suggest using MS method - register users on your site and each time user starts app connect to your site and check if app copy is registered.
0
 
LVL 27

Accepted Solution

by:
MacroShadow earned 1000 total points
ID: 39791822
1. Don't trust everything you are told, research it! Google is an amazing tool!

2. If you're afraid of reverse engineers, it doesn't matter what your security mechanism is, the hacker will be able to see it and work around it.

For example, if you decide to use a unique piece of information to generate a license per computer, the hacker can discover your algorithm (or code) and build his own key generator, to generate a license just like you would!

If you decide to use a licensing server, the hacker can patch your executable to skip the license check.

Just for proof you can upload a compiled exe and I will return it's source code!

3. You can make life harder for the potential hacker by using an obufscator, but the bottom line is if there's a will there's a way! You cant stop the bad guys, you can only make their job harder hopefully to demotivate them!

4. The maturity of a programmer is when he/she discovers that there is no fool proof method to guard one's intellectual property!
0
 

Author Closing Comment

by:Murray Brown
ID: 39791830
Thanks very much for the help
0
Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 
LVL 28

Expert Comment

by:Ark
ID: 39791834
Just for proof you can upload a compiled exe and I will return it's source code!
Should be " a compiled exe written with VS>6" :)
0
 

Author Comment

by:Murray Brown
ID: 39791848
Here's a compiled exe
0
 
LVL 27

Expert Comment

by:MacroShadow
ID: 39791994
No file uploaded.
0
 
LVL 27

Expert Comment

by:MacroShadow
ID: 39791995
Should be " a compiled exe written with VS>6" :)
The topic is dot net!
0

Featured Post

Concerto Cloud for Software Providers & ISVs

Can Concerto Cloud Services help you focus on evolving your application offerings, while delivering the best cloud experience to your customers? From DevOps to revenue models and customer support, the answer is yes!

Learn how Concerto can help you.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Article by: jpaulino
XML Literals are a great way to handle XML files and the community doesn’t use it as much as it should.  An XML Literal is like a String (http://msdn.microsoft.com/en-us/library/system.string.aspx) Literal, only instead of starting and ending with w…
A while ago, I was working on a Windows Forms application and I needed a special label control with reflection (glass) effect to show some titles in a stylish way. I've always enjoyed working with graphics, but it's never too clever to re-invent …
Video by: ITPro.TV
In this episode Don builds upon the troubleshooting techniques by demonstrating how to properly monitor a vSphere deployment to detect problems before they occur. He begins the show using tools found within the vSphere suite as ends the show demonst…
In this video you will find out how to export Office 365 mailboxes using the built in eDiscovery tool. Bear in mind that although this method might be useful in some cases, using PST files as Office 365 backup is troublesome in a long run (more on t…
Suggested Courses

719 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question