When I copy protect I usualy want cover two posibilities:
- one is the copying of the software to another machine
- and the second one is the use of the software after the user has decided he doesn't want it anymore.
- and the second one is the use of the software after the user has decided he doesn't want it anymore.
I the cheme you describe the computer generates a number, it is the given over to the service provider and the provider gives back the user another number which is the stored in the computer.
If the first number, the one generated by the computer, is somehow taken from the machine itself the authorization number given by the provider will allways work on that computer, it has no limit.
If, however, the number generated by the computer has two components, a machine identificator and a random number, the user cannot reactivate his program after his ussage time has expired.
Enrique
-----------------------------------------------------------------------------------------
Sr. Enrique
Libros, Multimedia y Software en Castellano
Visite nuestra tienda online:
Dirección electrónica
Teléfono y Fax:
+972 9 744 4701
Dirección postal:
Sr Enrique
P.O. Box 875
Ra'anana 43108
Israel
[To remove yourself from this list, or to change to digest mode, go to http://www.penworks.com/LUJ/lingo-l.cgi To post messages to the list, email [EMAIL PROTECTED] (Problems, email [EMAIL PROTECTED]) Lingo-L is for learning and helping with programming Lingo. Thanks!]