Home > Net >  Exe program how to prevent copy
Exe program how to prevent copy

Time:09-23

Made an exe program in c #, if you want to be a lot of sell the exe program should do, how to prevent others to copy, at least ensure copies to other computers without permission to use, does not consider to be cracked, through the account password, or secret key authentication login way can only be used for connecting to the database, this way is feasible degree how, do you have any other good ideas

CodePudding user response:

Have a activation code written in the registry

CodePudding user response:

reference 1st floor Bridge_go response:
have a activation code written registry
registry never get don't quite understand, if the installation program will activate code written to the registry of the computer, and then start the program after activation code entered manually, it and compare the data in the registry

CodePudding user response:

About, open the software will query the registry to whether have activation code, no popup window for input, the input and the inside of the program after comparing clock (better connected than), right is written to the registry,

CodePudding user response:

Used for the first time to generate a and native hardware (CPU, hard drive, network card MAC address, etc.) of the identification code, stored in a hidden place, each execution after testing, calibration, but machine is not in the hardware, but also unable to prevent the virtual machine, direct and effective way is to use hard Key technology, no Key will not be able to use the software,

CodePudding user response:

Reference
how to prevent others to copy, at least ensure copies to other computers without permission to use the


That I ask you for A minute from A computer copy to B I I use the same login to your account and allow?

If you allow the so-called copy, there is no meaning, with account login, and similar WeChat.

If it's not allowed. It can only use the machine to identity information on "the code" binding.

As for this "the code" see you. What machine code, hard disk, nic. Registry as you like.

Since you ask to the registry.. Probably is to look for a place to insert a key value in which the value is a guid. Then binding with its own identity.

If the registry does not exist or binding information does not match will not be able to use.

Others also don't know what you changed.

Before install the software, of course, does not rule out other people in the backup regedit before with after contrast.

So there is no best solution.. The gentleman do not prevent a.

But encryption dog should be the most close to the perfect solution.

CodePudding user response:

More reliable, personally think or hardware encryption dog, on the client machine, all things are likely to be change,
When selling software encryption dog actually the number of rules for software is hard, no matter how many copies of the software, you only have encryption dog equipment available,

CodePudding user response:

Must be encrypted dog best, a computer corresponds to a dog, if your software demand is bigger, then you can wait for money to foot cramps

CodePudding user response:

1. The encryption dog
2. The password is
3. According to the CPU Key things of soft or hard disk encryption

CodePudding user response:

Prevent file is copied generally is impossible, but let the other people can't use it can add a validation code (not consider be cracked), but really if you want to do big, or don't use c #, can too easily be decompiled,

CodePudding user response:

I have seen the most wonderful work is to use NTFS data streams, a began to see clearly don't want any one software registration code, copy is not running, a ghost,
The along while, later found with is NTFS data flow

Probably to introduce reference: https://www.cnblogs.com/luverose/p/4245355.html

Because of U disk is generally fat32 or for exfat, so copy flow is lost in the past, undetected,

CodePudding user response:

Offline encryption dog, could be connected to the Internet account password, or the way with the activation code

CodePudding user response:

Hardware encryption dog, can be achieved,

But I suggest you change a method: such as using the licence file,
  •  Tags:  
  • C#
  • Related