what to fake,
>> ...
>> if the parameters used cannot be faked, someone
>> able to hack th JAVA VM could do the job.
>>
>> This risks may be important to analyse for
>> financial transaction security, privacy protection,
>> or secrecy, but not just for
>> software licensing.
o avoid the smarters to hack your system...
>>>but is it your interest ?
>>>to avoid copy/paste license violation can be enough
>>>and hackers won't be frequent in serious organisations...
>>>
>>>If JSSE/JCE froml sun is not enough flexible
>>>try cr
tware licensing.
> -Message d'origine-
> De: Dain Sundstrom [mailto:[EMAIL PROTECTED]]
> Date: jeudi 21 février 2002 16:29
> À: Coetmeur, Alain
> Cc: '[EMAIL PROTECTED]'; [EMAIL PROTECTED]
> Objet: Re: [JBoss-user] Copy protection
>
>
> You really
>
>
>
>
>
>
>
>>-Message d'origine-
>>De: Leigh Wanstead [mailto:[EMAIL PROTECTED]]
>>Date: jeudi 21 février 2002 03:59
>>À: [EMAIL PROTECTED]
>>Objet: [JBoss-user] Copy protection
>>
>>
>>Hello everyone,
>
eigh Wanstead [mailto:[EMAIL PROTECTED]]
> Date: jeudi 21 février 2002 03:59
> À: [EMAIL PROTECTED]
> Objet: [JBoss-user] Copy protection
>
>
> Hello everyone,
>
> I am not sure if this is a correct place to ask. Anyway, here is the
> question.
>
> How to
You can't. You will have to learn to trust with your users.
-dain
Leigh Wanstead wrote:
> Hello everyone,
>
> I am not sure if this is a correct place to ask. Anyway, here is the
> question.
>
> How to protect your ear files? I mean if you deploy ear into application
> server, how you preve
Hello everyone,
I am not sure if this is a correct place to ask. Anyway, here is the
question.
How to protect your ear files? I mean if you deploy ear into application
server, how you prevent others simply copy this ear to another application
server? What 3rd party tools would you recommend?
Th