Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. Are 30-day evaluation apps ethical?

Are 30-day evaluation apps ethical?

Scheduled Pinned Locked Moved The Lounge
c++csharpcomwindows-adminquestion
23 Posts 16 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • N Nish Nishant

    There are several (hundreds of thousands) shareware/trialware applications that stop working after 30 days (or 15 or 21 or whatever). Uninstalling/reinstalling these apps will not get them to work again. The authors obviously have used some little tricks - like adding subtle entries to the registry, creating hidden files with names that do not attract suspicion etc. I understand why they do it, and I have even written a class that facilitates doing this (it's on CP too - though it's not remotely an effective solution). If you have installed/uninstalled a 100 of these apps, it means that there are a 100 of these 30-day-expiry detectors installed on your machine - without your explicit permission. How different would this be from a rootkit or from spyware? It's non-intrusive for sure, but it slows down your system (a bulkier registry for one thing), might create trash files in your windows and windows system folders (again an annoyance). So are these techniques ethical? Just because I installed an app, does that give that app's authors the right to install hidden software on my machine? Regards, Nish


    Nish’s thoughts on MFC, C++/CLI and .NET (my blog)
    Currently working on C++/CLI in Action for Manning Publications.

    J Offline
    J Offline
    Joe Woodbury
    wrote on last edited by
    #11

    By installing any software, you make a tacit agreement for that software to modify your system. By installing trial software, you make a tacit agreement to not use the software outside the trial period. It is entirely proper and fiscally responsible for a company to enforce this to a reasonable degree. I think a line can be drawn at passive techniques, such as hidden keys, versus active techniques, such as rootkits. Even with passive techniques a company should keep the footprint as small as possible. Anyone who thinks he has a better idea of what's good for people than people do is a swine. - P.J. O'Rourke

    1 Reply Last reply
    0
    • N Nish Nishant

      There are several (hundreds of thousands) shareware/trialware applications that stop working after 30 days (or 15 or 21 or whatever). Uninstalling/reinstalling these apps will not get them to work again. The authors obviously have used some little tricks - like adding subtle entries to the registry, creating hidden files with names that do not attract suspicion etc. I understand why they do it, and I have even written a class that facilitates doing this (it's on CP too - though it's not remotely an effective solution). If you have installed/uninstalled a 100 of these apps, it means that there are a 100 of these 30-day-expiry detectors installed on your machine - without your explicit permission. How different would this be from a rootkit or from spyware? It's non-intrusive for sure, but it slows down your system (a bulkier registry for one thing), might create trash files in your windows and windows system folders (again an annoyance). So are these techniques ethical? Just because I installed an app, does that give that app's authors the right to install hidden software on my machine? Regards, Nish


      Nish’s thoughts on MFC, C++/CLI and .NET (my blog)
      Currently working on C++/CLI in Action for Manning Publications.

      M Offline
      M Offline
      Member 96
      wrote on last edited by
      #12

      We have a 30 day eval application and I considered just this when I designed how it works. It's a business app and the expiration is stored in the database. If the user uninstalls they completely uninstall nothing is left behind. If they choose to fresh download, install again then they are starting with a fresh database so it's not perfect, but I don't feel good about hiding something on a users' computer. Bottom line is it's really just usefull as a reminder to people to purchase who are ultimately interested in using the software. All systems should be considered this way because there are certain people who will go to great lengths to not pay for software and they always will, no system will stop them ultimately and it's diminishing returns the more time you spend trying to prevent it. Leaving anything on a computer permanently and intentionally hiding that fact so the user can't know it to me is un-ethical. But to call it hidden software is a bit of sensastionalism don't you think? Usually it's just a registry key or something along those lines, it's not like it's an active program or any kind of program at all and I think you well know that so why state it in those terms?

      1 Reply Last reply
      0
      • L Lost User

        I remember back in the day... DOS - I knew what every file on my PC was for. Supreme confidence ruled the day. I was a god. :cool: Win3.x - I knew what most every file did. I could visually parse my INI files in seconds. While not a god, I was still pretty god-like. ;P Win9.x/NT/2K/XP - I remember snooping around after my first Win95 install. Terror prevailed. WTF were all these files? What's a registry? Oh shit!!! I was now a puppy. :omg: I've given up even trying. :| "If the world should blow itself up, the last audible voice would be that of an expert saying it can't be done." - Peter Ustinov

        M Offline
        M Offline
        Member 96
        wrote on last edited by
        #13

        I remember a hell of a lot of high end software that did all sorts of odd things for copy protection mostly making unreadable or writable sectors on disks but all sorts of things much worse than we see today.

        L 1 Reply Last reply
        0
        • M Member 96

          I remember a hell of a lot of high end software that did all sorts of odd things for copy protection mostly making unreadable or writable sectors on disks but all sorts of things much worse than we see today.

          L Offline
          L Offline
          Lost User
          wrote on last edited by
          #14

          John Cardinal wrote:

          ...all sorts of things much worse than we see today.

          Really?! Maybe I was just lucky but I don't remember much of anything like that. Of course, we were pretty vanilla (AutoCad, dBase, WordPerfect). "If the world should blow itself up, the last audible voice would be that of an expert saying it can't be done." - Peter Ustinov

          1 Reply Last reply
          0
          • N Nish Nishant

            There are several (hundreds of thousands) shareware/trialware applications that stop working after 30 days (or 15 or 21 or whatever). Uninstalling/reinstalling these apps will not get them to work again. The authors obviously have used some little tricks - like adding subtle entries to the registry, creating hidden files with names that do not attract suspicion etc. I understand why they do it, and I have even written a class that facilitates doing this (it's on CP too - though it's not remotely an effective solution). If you have installed/uninstalled a 100 of these apps, it means that there are a 100 of these 30-day-expiry detectors installed on your machine - without your explicit permission. How different would this be from a rootkit or from spyware? It's non-intrusive for sure, but it slows down your system (a bulkier registry for one thing), might create trash files in your windows and windows system folders (again an annoyance). So are these techniques ethical? Just because I installed an app, does that give that app's authors the right to install hidden software on my machine? Regards, Nish


            Nish’s thoughts on MFC, C++/CLI and .NET (my blog)
            Currently working on C++/CLI in Action for Manning Publications.

            C Offline
            C Offline
            Chris Losinger
            wrote on last edited by
            #15

            Nishant Sivakumar wrote:

            Just because I installed an app, does that give that app's authors the right to install hidden software on my machine?

            a stray file or registry entry is not "software". Cleek | Image Toolkits | Thumbnail maker

            1 Reply Last reply
            0
            • N Nish Nishant

              There are several (hundreds of thousands) shareware/trialware applications that stop working after 30 days (or 15 or 21 or whatever). Uninstalling/reinstalling these apps will not get them to work again. The authors obviously have used some little tricks - like adding subtle entries to the registry, creating hidden files with names that do not attract suspicion etc. I understand why they do it, and I have even written a class that facilitates doing this (it's on CP too - though it's not remotely an effective solution). If you have installed/uninstalled a 100 of these apps, it means that there are a 100 of these 30-day-expiry detectors installed on your machine - without your explicit permission. How different would this be from a rootkit or from spyware? It's non-intrusive for sure, but it slows down your system (a bulkier registry for one thing), might create trash files in your windows and windows system folders (again an annoyance). So are these techniques ethical? Just because I installed an app, does that give that app's authors the right to install hidden software on my machine? Regards, Nish


              Nish’s thoughts on MFC, C++/CLI and .NET (my blog)
              Currently working on C++/CLI in Action for Manning Publications.

              J Offline
              J Offline
              Jon Pawley
              wrote on last edited by
              #16

              Have you seen or tried Altiris' Software Virtualisation Solution[^]? It's very cool, and could possibly be used to capture all those rogue entries/files... Help you tidy up afterwards...? Jon

              1 Reply Last reply
              0
              • L Lost User

                Wjousts wrote:

                uninstalling an app was a simple as deleting it's folder and it was completely gone forever!

                Yep... except those of us who also needed to clean any "shrapnel" left behind in the AUTOEXEC.BAT and CONFIG.SYS files before we could sleep at night. :-O After that first Win95 install, I still remember feeling like I'd completely lost control of my PC. :~ "If the world should blow itself up, the last audible voice would be that of an expert saying it can't be done." - Peter Ustinov

                W Offline
                W Offline
                Wjousts
                wrote on last edited by
                #17

                Mike Mullikin wrote:

                Yep... except those of us who also needed to clean any "shrapnel" left behind in the AUTOEXEC.BAT and CONFIG.SYS files before we could sleep at night.

                A fair point. I'd almost forgotten about my autoexec.bat and config.sys. Then there was the fun of having to alter the autoexec.bat and config.sys yourself just to get a program to run because your mouse driver was using to much of the first 640K of memory. Oh the memories....

                1 Reply Last reply
                0
                • L Lost User

                  I remember back in the day... DOS - I knew what every file on my PC was for. Supreme confidence ruled the day. I was a god. :cool: Win3.x - I knew what most every file did. I could visually parse my INI files in seconds. While not a god, I was still pretty god-like. ;P Win9.x/NT/2K/XP - I remember snooping around after my first Win95 install. Terror prevailed. WTF were all these files? What's a registry? Oh shit!!! I was now a puppy. :omg: I've given up even trying. :| "If the world should blow itself up, the last audible voice would be that of an expert saying it can't be done." - Peter Ustinov

                  T Offline
                  T Offline
                  Tarakeshwar Reddy
                  wrote on last edited by
                  #18

                  Mike Mullikin wrote:

                  Win9.x/NT/2K/XP - I remember snooping around after my first Win95 install. Terror prevailed. WTF were all these files? What's a registry? Oh sh*t!!! I was now a puppy.

                  When win 95 was launched, I remmember installing it on my friends machine as his machine was suppose to be the fastest of our lots at that particular time(a 486 100 Mhz with 32 mb ram, 550 mb hdd which was a luxury then). His brother used to program in Turbo C++ and when he came home and saw that the machine directly booted to windows, he didnt like the idea of that and just went on and deleted that windows folder and you know what would happen when you do that, we spent a hell a lot of time figuring what to do and at last just formatted the hard disk and put back MS Dos 6.0 if I am rite. It was only after 6 more months that we installed win95 and we started to use it.


                  Tarakeshwar MCP, CCIE Q(R&S) Before you criticize someone, you should walk a mile in their shoes. That way, when you criticize them, you're a mile away and you have their shoes. !sgub evah t'nseod margorP sihT ?sgub naem ayaddahW

                  1 Reply Last reply
                  0
                  • N Nish Nishant

                    There are several (hundreds of thousands) shareware/trialware applications that stop working after 30 days (or 15 or 21 or whatever). Uninstalling/reinstalling these apps will not get them to work again. The authors obviously have used some little tricks - like adding subtle entries to the registry, creating hidden files with names that do not attract suspicion etc. I understand why they do it, and I have even written a class that facilitates doing this (it's on CP too - though it's not remotely an effective solution). If you have installed/uninstalled a 100 of these apps, it means that there are a 100 of these 30-day-expiry detectors installed on your machine - without your explicit permission. How different would this be from a rootkit or from spyware? It's non-intrusive for sure, but it slows down your system (a bulkier registry for one thing), might create trash files in your windows and windows system folders (again an annoyance). So are these techniques ethical? Just because I installed an app, does that give that app's authors the right to install hidden software on my machine? Regards, Nish


                    Nish’s thoughts on MFC, C++/CLI and .NET (my blog)
                    Currently working on C++/CLI in Action for Manning Publications.

                    L Offline
                    L Offline
                    Lost User
                    wrote on last edited by
                    #19

                    Rootkits, for some in-depth information about this aim your browser at www.sysinternals.com where there is a tutorial and downloadable software (free) to test your system for the rootkit. The program is called "Rootkit Revealer". Also while you are at that web site, download some of their other Freebies including RegMon (a registry monitor), Filemon (a file monitor) and so on. They are most excellent.

                    1 Reply Last reply
                    0
                    • N Nish Nishant

                      There are several (hundreds of thousands) shareware/trialware applications that stop working after 30 days (or 15 or 21 or whatever). Uninstalling/reinstalling these apps will not get them to work again. The authors obviously have used some little tricks - like adding subtle entries to the registry, creating hidden files with names that do not attract suspicion etc. I understand why they do it, and I have even written a class that facilitates doing this (it's on CP too - though it's not remotely an effective solution). If you have installed/uninstalled a 100 of these apps, it means that there are a 100 of these 30-day-expiry detectors installed on your machine - without your explicit permission. How different would this be from a rootkit or from spyware? It's non-intrusive for sure, but it slows down your system (a bulkier registry for one thing), might create trash files in your windows and windows system folders (again an annoyance). So are these techniques ethical? Just because I installed an app, does that give that app's authors the right to install hidden software on my machine? Regards, Nish


                      Nish’s thoughts on MFC, C++/CLI and .NET (my blog)
                      Currently working on C++/CLI in Action for Manning Publications.

                      C Offline
                      C Offline
                      Christian Graus
                      wrote on last edited by
                      #20

                      I did it with generic named files in the system directory. If they don't get used again, they won't have any huge effect on the PC, I wouldn't think. Although I guess it depends on how the file system works, they could well slow down the file system looking for files it needs ? Anyhow, it's more ethical than stealing software, and the only chance these companies have to survive. If you don't get the chance to use it for 30 days, you're not likely to decide you need it, or that it's any good. And you know what they are doing when you download a 30 day trial. Christian Graus - Microsoft MVP - C++

                      L 1 Reply Last reply
                      0
                      • C Christian Graus

                        I did it with generic named files in the system directory. If they don't get used again, they won't have any huge effect on the PC, I wouldn't think. Although I guess it depends on how the file system works, they could well slow down the file system looking for files it needs ? Anyhow, it's more ethical than stealing software, and the only chance these companies have to survive. If you don't get the chance to use it for 30 days, you're not likely to decide you need it, or that it's any good. And you know what they are doing when you download a 30 day trial. Christian Graus - Microsoft MVP - C++

                        L Offline
                        L Offline
                        Lost User
                        wrote on last edited by
                        #21

                        Unfortunately, the uninstall processes can leave many files and/or registry entries - programs don't clean-up themselves very well. There are good reasons for this - for instance - to stop you continually uninstall and re-install a trial program. Running RegMon and FileMon (freeware both from www.sysinternals) before installing any trial programs, they will record exactly what was happening to your computer (keep these running on "first run" of trial prog). Save report to a text file. You can then at anytime interrogate those txtfile records and clean-up your computer as if the trial/demo program was never installed. Note of caution, the textfile reports will be mammoth.

                        1 Reply Last reply
                        0
                        • C code frog 0

                          The difference... You knew the terms when you installed it. Rootkits rarely tell you in an obvious way, "Hey, we're going to inject our code into your OS and cripple your DRM related fun." Sony is a mud-lake of pig-spawn and I will never trust any product from them ever again.


                          If we all used the Plain English compiler every post in the lounge would be a programming question.:cool:
                          Welcome to CP in your language. Post the unicode version in My CP Blog [ ^ ] now.

                          People who don't understand how awesome Firefox is have never used CPhog. The act of using CPhog alone doesn't make Firefox cool. It opens your eyes to the possibilities and then you start looking for other things like CPhog and your eyes are suddenly open to all sorts of useful things all through Firefox. - (Self Quote)

                          G Offline
                          G Offline
                          Gary R Wheeler
                          wrote on last edited by
                          #22

                          code-frog wrote:

                          a mud-lake of pig-spawn

                          What a lovely turn of phrase. I must remember it for my design review next Monday.


                          Software Zen: delete this;

                          Fold With Us![^]

                          1 Reply Last reply
                          0
                          • N Nish Nishant

                            There are several (hundreds of thousands) shareware/trialware applications that stop working after 30 days (or 15 or 21 or whatever). Uninstalling/reinstalling these apps will not get them to work again. The authors obviously have used some little tricks - like adding subtle entries to the registry, creating hidden files with names that do not attract suspicion etc. I understand why they do it, and I have even written a class that facilitates doing this (it's on CP too - though it's not remotely an effective solution). If you have installed/uninstalled a 100 of these apps, it means that there are a 100 of these 30-day-expiry detectors installed on your machine - without your explicit permission. How different would this be from a rootkit or from spyware? It's non-intrusive for sure, but it slows down your system (a bulkier registry for one thing), might create trash files in your windows and windows system folders (again an annoyance). So are these techniques ethical? Just because I installed an app, does that give that app's authors the right to install hidden software on my machine? Regards, Nish


                            Nish’s thoughts on MFC, C++/CLI and .NET (my blog)
                            Currently working on C++/CLI in Action for Manning Publications.

                            R Offline
                            R Offline
                            Roger Wright
                            wrote on last edited by
                            #23

                            If 100 unused registry entries noticably slows your system, I'd trade in that Atari for something a bit more modern. Similarly, if 100 marker files hidden on the disk drive is annoying, it's time for a drive upgrade. Heck, Windows installs many hundreds of files that never get used - locales, icons, screensavers, etc - and can't be removed easily. Who notices? Sure it's ethical - if you didn't try to get around their protection schemes by reinstalling, you'd never have noticed.;) "...a photo album is like Life, but flat and stuck to pages." - Shog9

                            1 Reply Last reply
                            0
                            Reply
                            • Reply as topic
                            Log in to reply
                            • Oldest to Newest
                            • Newest to Oldest
                            • Most Votes


                            • Login

                            • Don't have an account? Register

                            • Login or register to search.
                            • First post
                              Last post
                            0
                            • Categories
                            • Recent
                            • Tags
                            • Popular
                            • World
                            • Users
                            • Groups