Navigation:  Copy Protection, Licensing, Evaluation, Activation >

Copy Protection - How it works

Previous pageReturn to chapter overviewNext page

 

Licence Protector  offers a media independent protection - the media itself like CD / DVD, download link or USB stick is not modified or protected. The copy protection does not prevent, that you can copy the data from CD to the hard disk but it prevents that the application can be started on multiple machines.

 

The licence is bound to a specific hardware ID of the PC (e.g. MAC address). The application will start only if the licence file is on the specified hardware. This works in a single user environment as well as in a network environment.

 

The advantage of a software copy protection is:

 

media independent - distribute the application via CD / DVD, download, USB stick or other media where you can store files
the application can run without a CD / DVD inserted
you can produce even one single CD - no need to have 1000 CDs duplicated at once
no problems with the CD / DVD drives or operating systems because no physical modification (like modification of the CD) is done

 

The additional step, which is necessary, is to transfer the hardware IDs. With Online activation, this step is automated. With activation by e-mail, fax or phone this is a manual process.

 

The following hardware IDs are supported:

 

Volume ID
MAC Address of the network adapter
Hostname
Netbios Name 1)
Volume ID and UNC Pathname
MAC Address and UNC Pathname
IP-Address 1)
Volume ID + MAC Address + Hostname + UNC Pathname 1)
Volume ID + MAC Address + Hostname 1)

 

Details as well as Pros and Cons about each criteria can be found in Part II - Details about Copy Protection

 

 

 

1) only available in Professional Edition

 

When using a network licence, the activation can be done from any PC/Client (not from the server) and it has to be done only once for all PC's. The PC/Client retrieves the hardware data (installation code) of the server

 

The hardware ID is hashed with the Project Secure Key - the result are different hardware IDs for each application.

 


Page url: http://www.helpserver.biz/onlinehelp/lp/easygo/2.5/help2000/index.html?copy_protection___how_it_works.htm