On 1/28/07, Dave Crozier <[EMAIL PROTECTED]> wrote:
> Personally I used to use Refox as a form of source protection but gave it up
> a long time ago on the basis that a selection of product "Branding" where
> the authorised user is shown on all screens

This is what we do.  Put the client name in a table, along with a
checksum so it can't easily be altered.  Make sure the client name
appears on all reports too.

> Lets face it, for a determined hacker there is no such thing as uncrackable
> software and to many applications in the fast the ability to copy it for
> evaluation but then purchase it at a sensible price has actually helped gain
> it popularity!

In my youth I used to remove copy protection from the odd computer
game.  You can't stop someone with plenty of time and a debugger.

-- 
Paul


_______________________________________________
Post Messages to: ProFox@leafe.com
Subscription Maintenance: http://leafe.com/mailman/listinfo/profox
OT-free version of this list: http://leafe.com/mailman/listinfo/profoxtech
** All postings, unless explicitly stated otherwise, are the opinions of the 
author, and do not constitute legal or medical advice. This statement is added 
to the messages for those lawyers who are too stupid to see the obvious.

Reply via email to