|
The best was when the rivet came out and you had to fumble with the discs to line them up! I remember Test Drive III from the early 90's had that three disc wheel and I sure did despise being forced to use it.
Jim
|
|
|
|
|
Jim Bennett wrote: Test Drive III
Oh man. Test Drive. *homer drool over childhood gaming memories*
regards,
Paul Watson
Ireland
Feed Henry!
eh, stop bugging me about it, give it a couple of days, see what happens.
|
|
|
|
|
Test Drive 1 on a 16 color IBM PS2 was probably my favorite until Earl Weaver Baseball. What's the matter, couldn't find 2nd?
Jim
|
|
|
|
|
|
can anyone help me about this method of protection?
how can i do this work?
if anyone got example , plz mail it to:meandyouwith2003@gmail.com
Plz Forgive for my bad english
Go0d LuCk.
|
|
|
|
|
It really is a function of cost. Given time the determined pirate will always win. Easy of use, i.e. not burdening the support center and cost of implementation, versus the ease of circumventing the protection must be balaced. For us it is mostly about preventing accidental or casual violations.
|
|
|
|
|
Since I've only been developing websites and inhouse systems in the last 6 years I'd say none as there would be no point.
Prior to that I did have a brief flirtation with Aladdin stuff - Before deciding it was a waste of money.
"On two occasions, I have been asked [by members of Parliament], 'Pray, Mr. Babbage, if you put into the machine wrong figures, will the right answers come out?' I am not able to rightly apprehend the kind of confusion of ideas that could provoke such a question."
--Charles Babbage (1791-1871)
My: Website | Blog
|
|
|
|
|
Colin Angus Mackay wrote: Aladdin stuff - Before deciding it was a waste of money
That surprise's me, I've been working with Aliddin's HASP keys for about five years now; to me, they are great value for money - but it does depend on the selling cost your aiming for.
- Dy
|
|
|
|
|
-Dy wrote: I've been working with Aliddin's HASP keys for about five years now; to me, they are great value for money
I suppose it is unfair to single out one company. We decided they were all a waste of money. It was going to cost us so much to buy the stuff, then some more to integrate it, then we talked to another company that was using their stuff and came to the conclusion that the support costs for the device were the killer. If it added zero to the existing support it may have been worth something.
"On two occasions, I have been asked [by members of Parliament], 'Pray, Mr. Babbage, if you put into the machine wrong figures, will the right answers come out?' I am not able to rightly apprehend the kind of confusion of ideas that could provoke such a question."
--Charles Babbage (1791-1871)
My: Website | Blog
|
|
|
|
|
I have choosen multiple answer since we use different approach based on software price.
If you have a vertical software (maybe with some tens or hundreds of user) the cost of a 'dongle' is only a small part of installation cost. The benefit of having (normally) a crypto ASIC on board can help in many aspect of copy protection and privacy.
But if the software is a selt-installed program the online registration with some lock mechanism (like HD serial number or MAC-Address) can be a good choice.
Another point is the needs for update, we have under development a software that needs dayly updates, so the internet connection to the server is a protection schema itself.
Davide
|
|
|
|