![]() ![]() Though not for the shrink-wrap software market. Somewhere in there I figured I was better at writing my own. I first learned ML programming by cracking games for the old school Apple and Commodore 64 (telling my age), then PC games (much easier), then I was cracking commercial applications. Frivolous techniques like that only keeps the honest users honest. I have to agree with the gent on the comment about only slowing down piracy by using a hardware / software scheme. If you want to challenge me personally, request my mailbox from Codeproject. ![]() That is where pro test their anti-piracy tech not in Codeproject. Tamuz, if you want real challenge, show your pride by bragging in Alstavista.MS forum where I belong or Friever, pinpoint any commercial software that is selling and using your HardWare Lock technique. Hope, you will be happy to sell your technique to Microsoft, Adobe, Disney and all those game developers, we will wait for them.Īnyway Mr. You claimed HardWare Lock is your technique, remember that Dongles too is HardwareLock, and has been broken. If your techniques worked so well and StarForce failed, why don’t you sell your magic to SONY? Or are you afraid it will fail just like Starforce? ![]() Do you remember SONY and StarForce scandal?"īy logic it is wrong to claim copy protection and still maintain the above quote from your site. ![]() No any encryption, No Software Locks, No checking for original media, No Hidden Drivers. Well I have gone to your site I got this: Hope you know that Codeproject is for learning and assisting in programming, not for challenge on copy protection, You are not a pro in copy protection field so I am not surprised that you are showing a claim of unbreakable in this site. Please remember some people in Africa can’t afford a PC not to talk of Software, while some people waste money building nuclear missiles! If all the above failed which I doubt send it to me, let me have a look at it. At the end of installation, use the Spy to create Dummy compressed installation files, and burn it on another CD. Run the Spy to be active, then run the installation software on the original CD while the Spy watches. Generate a new installation Exec file, and burn it with other files to create a new CD.ģ: If the CD proves stubborn, like Hexalock or Starforce that uses micro fingerprinting, get a Spy (Not Microsoft Spy!, I once wrote one and many is on the Net). There are different ways in doing it I will mention 3 out of 100!ġ: Make a clone of the original CD with Freeware or Shareware CD copy software (many of them is available on the Net) the Serial Number will be the same.Ģ: You can attack the Installation Exec Code with Hexa-debug in C/C++ or assembler and bypass the Serial Number Detecting Code. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2022
Categories |