Software protection
-
Does anybody have a real experience with some commercial protection suite, as I need to implement it for the organization I work for? Dotfuscator I am not interested in, as we already use it and we will sure apply it before running any other protection scheme. We are specifically interested in protection of the assemblies themselves and a copy protection, so that the code could only run on a specific machines. Thanks.
-
Does anybody have a real experience with some commercial protection suite, as I need to implement it for the organization I work for? Dotfuscator I am not interested in, as we already use it and we will sure apply it before running any other protection scheme. We are specifically interested in protection of the assemblies themselves and a copy protection, so that the code could only run on a specific machines. Thanks.
mirano wrote:
protection of the assemblies themselves
What exactly do you mean by this?
mirano wrote:
copy protection, so that the code could only run on a specific machines
Have a look at http://www.xheo.com[^].
-
Does anybody have a real experience with some commercial protection suite, as I need to implement it for the organization I work for? Dotfuscator I am not interested in, as we already use it and we will sure apply it before running any other protection scheme. We are specifically interested in protection of the assemblies themselves and a copy protection, so that the code could only run on a specific machines. Thanks.
Depending on how much control you wish to have versus how much code you wish to write, you can take a client server approach where each station effectively checks out a license in order to get access to the resources. This is how the commercial product FlexLM works. From a software only point of view you can write the client stub and server code pretty easy but all of your apps would have to bind to the client stub in in order to request a license. If you wish to buy a solution then you can get information about FlexLM from Macrovision's website. The chief selling point of FlexLM is a very good encryption scheme so that makes it hard for the average crook to steal unliscened usage. As I said, you can definitely write your own implementation of such a scheme but you will need to ensure your own encryption scheme is up to the task. This might be a viable path if there are extenuating requirements you must factor in. Good Luck Mike Luster