|
Navigation: Copy Protection, Licensing, Evaluation, Activation > Copy Protection - How it works |
![]() ![]()
|
Licence Protector offers a media independent protection - the media itself like CD / DVD, download link or USB stick is not modified or protected. The copy protection does not prevent, that you can copy the data from CD to the hard disk but it prevents that the application can be started on multiple machines.
The licence is bound to a specific hardware ID of the PC (e.g. MAC address). The application will start only if the licence file is on the specified hardware. This works in a single user environment as well as in a network environment.
The advantage of a software copy protection is:
| • | media independent - distribute the application via CD / DVD, download, USB stick or other media where you can store files |
| • | the application can run without a CD / DVD inserted |
| • | you can produce even one single CD - no need to have 1000 CDs duplicated at once |
| • | no problems with the CD / DVD drives or operating systems because no physical modification (like modification of the CD) is done |
The additional step, which is necessary, is to transfer the hardware IDs. With Online activation, this step is automated. With activation by e-mail, fax or phone this is a manual process.
The following hardware IDs are supported:
| • | Volume ID |
| • | MAC Address of the network adapter |
| • | Hostname |
| • | Netbios Name 1) |
| • | Volume ID and UNC Pathname |
| • | MAC Address and UNC Pathname |
| • | IP-Address 1) |
| • | Volume ID + MAC Address + Hostname + UNC Pathname 1) |
| • | Volume ID + MAC Address + Hostname 1) |
Details as well as Pros and Cons about each criteria can be found in Part II - Details about Copy Protection
1) only available in Professional Edition
When using a network licence, the activation can be done from any PC/Client (not from the server) and it has to be done only once for all PC's. The PC/Client retrieves the hardware data (installation code) of the server
The hardware ID is hashed with the Project Secure Key - the result are different hardware IDs for each application.