Click here to Skip to main content
15,919,132 members
Home / Discussions / Visual Basic
   

Visual Basic

 
GeneralRe: How can I import table from one database to another thru a from in VB.net Pin
waner michaud26-Jan-10 8:21
waner michaud26-Jan-10 8:21 
GeneralRe: How can I import table from one database to another thru a from in VB.net Pin
Eddy Vluggen26-Jan-10 8:35
professionalEddy Vluggen26-Jan-10 8:35 
GeneralRe: How can I import table from one database to another thru a from in VB.net Pin
waner michaud26-Jan-10 8:44
waner michaud26-Jan-10 8:44 
QuestionMake window application secure Pin
NarendraSinghJTV22-Jan-10 1:17
NarendraSinghJTV22-Jan-10 1:17 
AnswerRe: Make window application secure Pin
Gagan.2022-Jan-10 1:50
Gagan.2022-Jan-10 1:50 
GeneralRe: Make window application secure Pin
NarendraSinghJTV26-Jan-10 17:58
NarendraSinghJTV26-Jan-10 17:58 
GeneralRe: Make window application secure Pin
Gagan.2026-Jan-10 20:44
Gagan.2026-Jan-10 20:44 
AnswerRe: Make window application secure Pin
loyal ginger22-Jan-10 3:45
loyal ginger22-Jan-10 3:45 
Registry and/or secret file as pointed out by the previous post are good enough for normal use. People can always find the registry key or the secret file and modify it. They can also turn back time briefly to run a trial version of the program if it is setup that way.

To be more secure, you need to gather information about the machine that the setup program had run on, and encrypt it, then save it to the registry. Each time the program is run, it gathers the same information, encrypt it using the same algorithm, and compare the result in the registry. One of these things will happen:

1. The information in the registry is the same as the newly encrypted information. The program can preceed.

2. The information in the registry is different as the newly encrypted information, indicating that the registry was messed with by somebody, or it's a different machine. The program will terminate.

3. The information in the registry is not found. The program will terminate.

The information collected can include things like the MAC address of the NIC, as well as other ID's that are different from machine to machine.

There is a risk that people can install your program on multiple machines, and read the registry to find out what algorighm you used to encrypt the information. They have also to try to find out what information is collected. That take a good effort. Hopefully that will intimidate them off.

For the implementation of a trial version of your program you need to implement similar algorithms but rely on other resources for time, such as that from the Internet. You can also put checks on time consistancy so if you find that the time is messed with, the program simply terminates.

Once any of the above checks fails, the program should put a mark down (also encrypted) so later runs of the program, even though it may pass the checks, will not authorize a "go". The program will be dead.
GeneralRe: Make window application secure Pin
NarendraSinghJTV26-Jan-10 18:03
NarendraSinghJTV26-Jan-10 18:03 
QuestionRead DXF File Pin
hellogany21-Jan-10 22:44
hellogany21-Jan-10 22:44 
AnswerRe: Read DXF File Pin
DaveAuld21-Jan-10 23:25
professionalDaveAuld21-Jan-10 23:25 
QuestionCRC32 computation and error detection Pin
Gagan.2021-Jan-10 22:26
Gagan.2021-Jan-10 22:26 
AnswerRe: CRC32 computation and error detection Pin
DaveAuld21-Jan-10 23:23
professionalDaveAuld21-Jan-10 23:23 
AnswerRe: CRC32 computation and error detection Pin
Luc Pattyn22-Jan-10 1:40
sitebuilderLuc Pattyn22-Jan-10 1:40 
GeneralRe: CRC32 computation and error detection Pin
Gagan.2022-Jan-10 1:44
Gagan.2022-Jan-10 1:44 
GeneralRe: CRC32 computation and error detection Pin
Luc Pattyn22-Jan-10 2:09
sitebuilderLuc Pattyn22-Jan-10 2:09 
GeneralRe: CRC32 computation and error detection Pin
Gagan.2022-Jan-10 2:17
Gagan.2022-Jan-10 2:17 
GeneralRe: CRC32 computation and error detection [modified] Pin
Luc Pattyn22-Jan-10 3:09
sitebuilderLuc Pattyn22-Jan-10 3:09 
Questionhow to lock keyboard and mouse by vb6 code Pin
zhiyuan1621-Jan-10 22:08
zhiyuan1621-Jan-10 22:08 
QuestionRe: how to lock keyboard and mouse by vb6 code Pin
Eddy Vluggen22-Jan-10 0:22
professionalEddy Vluggen22-Jan-10 0:22 
QuestionHelp, Pretty Please Exporting to Excel Pin
technette21-Jan-10 11:11
technette21-Jan-10 11:11 
AnswerRe: Help, Pretty Please Exporting to Excel Pin
DaveAuld21-Jan-10 12:11
professionalDaveAuld21-Jan-10 12:11 
AnswerRe: Help, Pretty Please Exporting to Excel Pin
Dave Kreskowiak21-Jan-10 12:56
mveDave Kreskowiak21-Jan-10 12:56 
AnswerRe: Help, Pretty Please Exporting to Excel Pin
Rick Shaub22-Jan-10 8:01
Rick Shaub22-Jan-10 8:01 
AnswerRe: Help, Pretty Please Exporting to Excel Pin
technette22-Jan-10 13:46
technette22-Jan-10 13:46 

General General    News News    Suggestion Suggestion    Question Question    Bug Bug    Answer Answer    Joke Joke    Praise Praise    Rant Rant    Admin Admin   

Use Ctrl+Left/Right to switch messages, Ctrl+Up/Down to switch threads, Ctrl+Shift+Left/Right to switch pages.