Frequently Asked Questions General Questions & Answers • • • • • Product and System Compatibility • • • • • • • • • • • • Product Features and Capabilities • • • • • • • • • • • • • • • • • • • • Support • • • Other • • • General Questions & Answers • Why should I protect my software? • Vertical markets are major targets. If you are in a vertical market, you can't afford to lose sales through unauthorized use of your software. Your market is limited and each lost sale is significant. Using a copyright notice is like putting up road signs without police to enforce the traffic laws. If the opportunity exists to copy your software, people will. The more expensive a program is, the more copying of it occurs. • Technical support can lead to increased sales. CrypKey products require little support and they use friendly methods that are no more obtrusive than your own software. If a customer gets a CrypKey-related call, it's normally because the software is not supposed to run. This presents a sales opportunity for you, rather than an annoying support problem. CrypKey DAL can be used to control the sales and licensing of products by foreign distributors. The vendor provides an SKG to the distributor with a specified number of license authorizations. The distributor uses the SKG to authorize the software it has sold. • Increase sales by sharing software. With CrypKey software protection, you can feel confident about encouraging your users to share your software. You can design your software to run in limited demo mode until purchased, then offer a free automatic, limited-time trial period or grant a trial period only after your authorization. Users are free to copy your software.but only on your terms. CrypKey products make shareware obsolete by permitting totally secure software sharing. • Global sales may increase the piracy threat. In many countries, copyright laws do not protect software. CrypKey products are PC-compatible, and protect all Windows applications from Windows XP up to the latest Windows versions. • What kinds of software licensing models does CrypKey offer? CrypKey offers a comprehensive tool chest of licensing models that covers almost any licensing scenario that your company would offer. This includes: • Trial or Evaluation Licenses (out of the box) • Stand Alone (node-locked) • Time Limited • Use Limited (or license all or part of your program by the number of Runs) • Features-based control • Floating Network Licensing (shared drive and client/server options) “X” number of concurrent users. • USBKey licensing (similar to Dongles) provides perpetual, date expiry and time limited licensing. These affordable USBKey licenses can be used in combination with standard CrypKey electronic license. • CrypKey Enterprise provides an additional “license file” which allows for complex licensing and write your own license features • How well do CrypKey products protect against computer hackers who want to defeat copy protection? A variety of techniques are employed with Instant to complicate the hacker's job. Instrukciya po ispitaniyu ptv. Although we can't reveal them all, a short list includes: • Random Encryption. Hackers are more dangerous if they can make one patch that will work on all programs protected by a particular tool. CrypKey protection behaves differently on each application so that a hacker's efforts on another software protected by CrypKey will not apply to your software. • The Math Challenge. Often the reason why a program can be hacked is that the security function returns a simple '0' or error number, so it is easy to rewrite the binary code to simply return '0'. CrypKey has a function that returns the result of a complex randomized calculation only if the program is authorized to run. The programmer can reproduce the calculation and check for correct results. But the hacker has no way to reproduce the calculation, since it is based on secret, encrypted numbers that are customized to each CrypKey customer. • Encryption & Cyclic Redundancy Checks (CRC). This is like a very complicated check sum. Encryption combined with CRC makes a powerful barrier to tampering with digital information. • Activation of CrypKey Stealth A companion product integrated with both CrypKey SDK (Software Developer Kit) and CrypKey Instant that provides security by encrypting your EXEs and DLLs, as well as encrypting your program while it is running in memory. For CrypKey SDK users, the software programmer has more responsibility to prevent hacking. Similar to with CrypKey Instant, CrypKey provides: • The Math Challenge. • Encryption & Cyclic Redundancy Checks (CRC). From the outset Midal has stood by its company philosophy, 'Setting the Standards that others can follow'. Kniga receptov dlya muljtivarki polaris pmc 0508d. • Activating CrypKey Stealth. • Anti-hacking techniques. These enable the programmer to do as much or as little as necessary (as described in the product manual). • How does CrypKey protect a product on a network? CrypKey uses the same protection methods on a network as on a stand-alone system, and also implements intelligent network license management that limits the number of users based on the license restrictions and releases locked licenses that may occur due to a client system crash. • How do CrypKey copy protection tools lock the license to the computer? Super robot taisen impact iso. CrypKey Intelligent Hardware Sensing (CIHS) is a complex, stable and robust system that locks the license you provide to your customer to the Windows PC it is installed on.
0 Comments
Leave a Reply. |